<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aaron.weaver2</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Aaron.weaver2"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Aaron.weaver2"/>
		<updated>2026-05-06T10:09:43Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248595</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248595"/>
				<updated>2019-03-09T21:58:21Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* OWASP DefectDojo */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Insecure web services/application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Web services deployed in OpenWRT containing critical vulnerabilities showcasing the traditional IoT problems. It must contain the following vulnerabilities to be used with the IoT testing guide: SQL injection, local inclusion and XXE injection (I1), Insufficient Authentication (I2), transfer sensitive information using insecure channels (I4).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Web security&lt;br /&gt;
* Embedded Security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure services===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Create/Install/Document network services with security vulnerabilities and insecure configurations that can be abused during the challenges.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure web services/application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Web services deployed in OpenWRT containing critical vulnerabilities showcasing the traditional IoT problems. It must contain the following vulnerabilities to be used with the IoT testing guide: SQL injection, local inclusion and XXE injection (I1), Insufficient Authentication (I2), transfer sensitive information using insecure channels (I4).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Web security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure Android/iOS application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* .Android application containing client and server side vulnerabilities covering the OWASP TOP 10 Mobile Risks.&lt;br /&gt;
* iOS application containing client and server side vulnerabilities covering the OWASP TOP 10 Mobile Risks.&lt;br /&gt;
* Web Services deployed as a service in OpenWrt to be used by the Android/iOS clients.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Mobile security knowledge.&lt;br /&gt;
* Mobile/Web development knowledge.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243572</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243572"/>
				<updated>2018-09-20T13:12:05Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: Clean up&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Philadelphia&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243571</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243571"/>
				<updated>2018-09-20T13:11:05Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* All Meetings on Meetup.com */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Philadelphia&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243570</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243570"/>
				<updated>2018-09-20T13:10:34Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Thursday, January 19 AT 5:45 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Philadelphia&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243569</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=243569"/>
				<updated>2018-09-20T13:10:17Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: Including meetup meetings&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Philadelphia&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 19 AT 5:45'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' AXINet&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/236793133/&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
5:45 - 6:00 | Introduction and settle-in (Alpine Cyber Solutions)&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:40| Aaron Weaver (Philadelphia OWASP Chapter Lead) Securing AWS with LAMBDA&lt;br /&gt;
&lt;br /&gt;
6:40 - 7:10 | Open Forum - Bring your questions, successes, and stories!&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242807</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242807"/>
				<updated>2018-08-24T15:26:18Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: Update new github link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is an Application Security Program tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python and Django.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/DefectDojo/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/defectdojo/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://www.defectdojo.org/ DefectDojo Product Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [23 July 2018] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.5.1 Version 1.5.1 Released]&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project.&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''July 2018 Release 1.5:'''&lt;br /&gt;
** Updated UI with a new DefectDojo logo, default colors and CSS.&lt;br /&gt;
** Updated Product views with tabs for Product Overview, Metrics, Engagements, Endpoints, Benchmarks (ASVS), and Settings to make it easier to navigate and manage your products.&lt;br /&gt;
** New Product Information fields: Regulations, Criticality, Platform, Lifecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&lt;br /&gt;
** Languages pie chart on product overview, only supported through the API and Django admin, integrates with cloc analyzer&lt;br /&gt;
** New Engagement type of CI/CD to support continual testing&lt;br /&gt;
** Engagement shortcuts and ability to import findings and auto-create an engagement&lt;br /&gt;
** Engagement labels for overdue, no tests and findings&lt;br /&gt;
** New Contextual menus throughout DefectDojo and shortcuts to new findings and critical findings&lt;br /&gt;
** Ability to merge a finding into a parent finding and either inactivate or delete the merged findings.&lt;br /&gt;
** Report improvements and styling adjustment with the default option of HTML reports&lt;br /&gt;
** SLA for remediation of severities based on finding criticality, for example critical findings remediated within 7 days. Configurable in System Settings.&lt;br /&gt;
** Engagement Auto-Close Days in System Settings. Automatically close an engagement if open past the end date.&lt;br /&gt;
** Ability to apply remediation advice based on CWE. For example XSS can be configured as a template so that it’s consistent across all findings. Enabled in system settings.&lt;br /&gt;
** Finding confidence field supported from scanners. First implementation in the Burp importer.&lt;br /&gt;
** Goast importer for static analysis of Golang products&lt;br /&gt;
** Celery status check on System Settings&lt;br /&gt;
** Beta rules framework release for modifying findings on the fly&lt;br /&gt;
** DefectDojo 2.0 API with Swagger support&lt;br /&gt;
** Created and Modified fields on all major tables&lt;br /&gt;
** Various bug fixes reported on Github&lt;br /&gt;
&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
| leader_name4=Aaron Weaver&lt;br /&gt;
| leader_email4=aaron.weaver@owasp.org}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242806</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242806"/>
				<updated>2018-08-24T15:23:41Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: Yay, Flagship project&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is an Application Security Program tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.11.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/DefectDojo/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://www.defectdojo.org/ DefectDojo Product Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [23 July 2018] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.5.1 Version 1.5.1 Released]&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project.&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''July 2018 Release 1.5:'''&lt;br /&gt;
** Updated UI with a new DefectDojo logo, default colors and CSS.&lt;br /&gt;
** Updated Product views with tabs for Product Overview, Metrics, Engagements, Endpoints, Benchmarks (ASVS), and Settings to make it easier to navigate and manage your products.&lt;br /&gt;
** New Product Information fields: Regulations, Criticality, Platform, Lifecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&lt;br /&gt;
** Languages pie chart on product overview, only supported through the API and Django admin, integrates with cloc analyzer&lt;br /&gt;
** New Engagement type of CI/CD to support continual testing&lt;br /&gt;
** Engagement shortcuts and ability to import findings and auto-create an engagement&lt;br /&gt;
** Engagement labels for overdue, no tests and findings&lt;br /&gt;
** New Contextual menus throughout DefectDojo and shortcuts to new findings and critical findings&lt;br /&gt;
** Ability to merge a finding into a parent finding and either inactivate or delete the merged findings.&lt;br /&gt;
** Report improvements and styling adjustment with the default option of HTML reports&lt;br /&gt;
** SLA for remediation of severities based on finding criticality, for example critical findings remediated within 7 days. Configurable in System Settings.&lt;br /&gt;
** Engagement Auto-Close Days in System Settings. Automatically close an engagement if open past the end date.&lt;br /&gt;
** Ability to apply remediation advice based on CWE. For example XSS can be configured as a template so that it’s consistent across all findings. Enabled in system settings.&lt;br /&gt;
** Finding confidence field supported from scanners. First implementation in the Burp importer.&lt;br /&gt;
** Goast importer for static analysis of Golang products&lt;br /&gt;
** Celery status check on System Settings&lt;br /&gt;
** Beta rules framework release for modifying findings on the fly&lt;br /&gt;
** DefectDojo 2.0 API with Swagger support&lt;br /&gt;
** Created and Modified fields on all major tables&lt;br /&gt;
** Various bug fixes reported on Github&lt;br /&gt;
&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
| leader_name4=Aaron Weaver&lt;br /&gt;
| leader_email4=aaron.weaver@owasp.org}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242100</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242100"/>
				<updated>2018-07-25T12:43:06Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is an Application Security Program tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.11.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/DefectDojo/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://www.defectdojo.org/ DefectDojo Product Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [23 July 2018] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.5.1 Version 1.5.1 Released]&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project.&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''July 2018 Release 1.5:'''&lt;br /&gt;
** Updated UI with a new DefectDojo logo, default colors and CSS.&lt;br /&gt;
** Updated Product views with tabs for Product Overview, Metrics, Engagements, Endpoints, Benchmarks (ASVS), and Settings to make it easier to navigate and manage your products.&lt;br /&gt;
** New Product Information fields: Regulations, Criticality, Platform, Lifecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&lt;br /&gt;
** Languages pie chart on product overview, only supported through the API and Django admin, integrates with cloc analyzer&lt;br /&gt;
** New Engagement type of CI/CD to support continual testing&lt;br /&gt;
** Engagement shortcuts and ability to import findings and auto-create an engagement&lt;br /&gt;
** Engagement labels for overdue, no tests and findings&lt;br /&gt;
** New Contextual menus throughout DefectDojo and shortcuts to new findings and critical findings&lt;br /&gt;
** Ability to merge a finding into a parent finding and either inactivate or delete the merged findings.&lt;br /&gt;
** Report improvements and styling adjustment with the default option of HTML reports&lt;br /&gt;
** SLA for remediation of severities based on finding criticality, for example critical findings remediated within 7 days. Configurable in System Settings.&lt;br /&gt;
** Engagement Auto-Close Days in System Settings. Automatically close an engagement if open past the end date.&lt;br /&gt;
** Ability to apply remediation advice based on CWE. For example XSS can be configured as a template so that it’s consistent across all findings. Enabled in system settings.&lt;br /&gt;
** Finding confidence field supported from scanners. First implementation in the Burp importer.&lt;br /&gt;
** Goast importer for static analysis of Golang products&lt;br /&gt;
** Celery status check on System Settings&lt;br /&gt;
** Beta rules framework release for modifying findings on the fly&lt;br /&gt;
** DefectDojo 2.0 API with Swagger support&lt;br /&gt;
** Created and Modified fields on all major tables&lt;br /&gt;
** Various bug fixes reported on Github&lt;br /&gt;
&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
|leader_name4=Aaron Weaver|leader_email5=aaron.weaver@owasp.org}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242099</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242099"/>
				<updated>2018-07-25T12:40:43Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is an Application Security Program tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.11.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/DefectDojo/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://www.defectdojo.org/ DefectDojo Product Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project.&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''July 2018 Release 1.5:'''&lt;br /&gt;
** Updated UI with a new DefectDojo logo, default colors and CSS.&lt;br /&gt;
** Updated Product views with tabs for Product Overview, Metrics, Engagements, Endpoints, Benchmarks (ASVS), and Settings to make it easier to navigate and manage your products.&lt;br /&gt;
** New Product Information fields: Regulations, Criticality, Platform, Lifecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&lt;br /&gt;
** Languages pie chart on product overview, only supported through the API and Django admin, integrates with cloc analyzer&lt;br /&gt;
** New Engagement type of CI/CD to support continual testing&lt;br /&gt;
** Engagement shortcuts and ability to import findings and auto-create an engagement&lt;br /&gt;
** Engagement labels for overdue, no tests and findings&lt;br /&gt;
** New Contextual menus throughout DefectDojo and shortcuts to new findings and critical findings&lt;br /&gt;
** Ability to merge a finding into a parent finding and either inactivate or delete the merged findings.&lt;br /&gt;
** Report improvements and styling adjustment with the default option of HTML reports&lt;br /&gt;
** SLA for remediation of severities based on finding criticality, for example critical findings remediated within 7 days. Configurable in System Settings.&lt;br /&gt;
** Engagement Auto-Close Days in System Settings. Automatically close an engagement if open past the end date.&lt;br /&gt;
** Ability to apply remediation advice based on CWE. For example XSS can be configured as a template so that it’s consistent across all findings. Enabled in system settings.&lt;br /&gt;
** Finding confidence field supported from scanners. First implementation in the Burp importer.&lt;br /&gt;
** Goast importer for static analysis of Golang products&lt;br /&gt;
** Celery status check on System Settings&lt;br /&gt;
** Beta rules framework release for modifying findings on the fly&lt;br /&gt;
** DefectDojo 2.0 API with Swagger support&lt;br /&gt;
** Created and Modified fields on all major tables&lt;br /&gt;
** Various bug fixes reported on Github&lt;br /&gt;
&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
|leader_name4=Aaron Weaver|leader_email5=aaron.weaver@owasp.org}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242098</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=242098"/>
				<updated>2018-07-25T12:38:31Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is an Application Security Program tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.11.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/DefectDojo/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://www.defectdojo.org/ DefectDojo Product Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/ Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/DefectDojo/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project.&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''July 2018 Release 1.5:'''&lt;br /&gt;
** Updated UI with a new DefectDojo logo, default colors and CSS.&lt;br /&gt;
** Updated Product views with tabs for Product Overview, Metrics, Engagements, Endpoints, Benchmarks (ASVS), and Settings to make it easier to navigate and manage your products.&lt;br /&gt;
** New Product Information fields: Regulations, Criticality, Platform, Lifecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&lt;br /&gt;
** Languages pie chart on product overview, only supported through the API and Django admin, integrates with cloc analyzer&lt;br /&gt;
** New Engagement type of CI/CD to support continual testing&lt;br /&gt;
** Engagement shortcuts and ability to import findings and auto-create an engagement&lt;br /&gt;
** Engagement labels for overdue, no tests and findings&lt;br /&gt;
** New Contextual menus throughout DefectDojo and shortcuts to new findings and critical findings&lt;br /&gt;
** Ability to merge a finding into a parent finding and either inactivate or delete the merged findings.&lt;br /&gt;
** Report improvements and styling adjustment with the default option of HTML reports&lt;br /&gt;
** SLA for remediation of severities based on finding criticality, for example critical findings remediated within 7 days. Configurable in System Settings.&lt;br /&gt;
** Engagement Auto-Close Days in System Settings. Automatically close an engagement if open past the end date.&lt;br /&gt;
** Ability to apply remediation advice based on CWE. For example XSS can be configured as a template so that it’s consistent across all findings. Enabled in system settings.&lt;br /&gt;
** Finding confidence field supported from scanners. First implementation in the Burp importer.&lt;br /&gt;
** Goast importer for static analysis of Golang products&lt;br /&gt;
** Celery status check on System Settings&lt;br /&gt;
** Beta rules framework release for modifying findings on the fly&lt;br /&gt;
** DefectDojo 2.0 API with Swagger support&lt;br /&gt;
** Created and Modified fields on all major tables&lt;br /&gt;
** Various bug fixes reported on Github&lt;br /&gt;
&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=241121</id>
		<title>OWASP DefectDojo Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_DefectDojo_Project&amp;diff=241121"/>
				<updated>2018-06-04T14:53:07Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP DefectDojo Tool Project ==&lt;br /&gt;
An open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools.&lt;br /&gt;
&lt;br /&gt;
DefectDojo is a tracking tool written in Python / Django. DefectDojo was created in 2013 and open-sourced on March 13th, 2015. The project was started to make optimizing vulnerability tracking less painful. The top goal of DefectDojo is to reduce the amount of time security professionals spend logging vulnerabilities. DefectDojo accomplishes this by offering a templating system for vulnerabilities, imports for common vulnerability scanners, report generation, and metrics.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
DefectDojo streamlines the testing process through several 'models' that an admin can manipulate with Python code. The core models include: 'engagements', 'tests' and 'findings'. DefectDojo has supplemental models that facilitate metrics, authentication, report generation, and tools. DefectDojo is written in Python 2.7 with Django 1.8.&lt;br /&gt;
&lt;br /&gt;
Testing or installing DefectDojo is easy. There is a live demo for interested parties to try Dojo [https://github.com/rackerlabs/django-DefectDojo#demo here]. If you decide to setup an instance of Dojo for your organization, we have developed a script that handles all dependencies, configures the database, and creates a super user. Complete installation instructions are found [https://github.com/rackerlabs/django-DefectDojo#installation here]. A complete walk-through can be found [http://defectdojo.readthedocs.org/en/latest/ here]. Documented example workflows can be found [https://github.com/rackerlabs/django-DefectDojo/blob/master/doc/workflows.md].&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
DefectDojo is licensed under the [https://github.com/rackerlabs/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License].&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo#demo Live Demo]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/blob/master/docs/getting-started.rst Getting Started Guide]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/releases What's New]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/rackerlabs/django-DefectDojo/issues Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
[https://www.owasp.org/index.php/User:Devgreg Greg Anderson] [mailto:greg.anderson@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[mailto:charles.neill@owasp.org Charles Neill]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Grendel Jay Paz][mailto:jay.paz@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/User:Aweaver Aaron Weaver][mailto:aaron.weaver@owasp.org @]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_AppSec_Pipeline OWASP AppSec Pipeline]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_CODE.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Code]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [15 Dec 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2.1 Version  1.2.1 Released]&lt;br /&gt;
* [20 Sep 2017] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.2 Version  1.2.0 Released]&lt;br /&gt;
* [19 Dec 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.3 Version  1.1.3 Released]&lt;br /&gt;
* [12 Nov 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.2 Version  1.1.2 Released]&lt;br /&gt;
* [13 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.1 Version  1.1.1 Released]&lt;br /&gt;
* [1 Oct 2016] [https://github.com/OWASP/django-DefectDojo/releases/tag/1.1.0 Version 1.1.0 Released]&lt;br /&gt;
* [22 Dec 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.5 Version 1.0.5 Released]&lt;br /&gt;
* [08 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.4 Version 1.0.4 Released]&lt;br /&gt;
* [27 Jul 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.3 Version 1.0.3 Released]&lt;br /&gt;
* [16 Jun 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.2 Version 1.0.2 Released]&lt;br /&gt;
* [30 Sep 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0.1 Version 1.0.1 Released]&lt;br /&gt;
* [02 Apr 2015] [https://github.com/rackerlabs/django-DefectDojo/releases/tag/v1.0 Version 1.0.0 Released]&lt;br /&gt;
* [15 Mar 2015] [https://github.com/rackerlabs/django-DefectDojo DefectDojo is open-sourced]&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leaders aware of your available time to contribute to the project. It is also important to let the Leaders know how you would like to contribute and pitch in to help the project meet its goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. If you are a programmer and wish to contribute code, we regularly review [https://github.com/rackerlabs/django-DefectDojo/pulls pull requests].&lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for people to help translate our documentation. See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
The project is extremely grateful for all of our contributors both prior to becoming open source and after. &lt;br /&gt;
[https://github.com/OWASP/django-DefectDojo/graphs/contributors Contributors since going open source].&lt;br /&gt;
&lt;br /&gt;
==Sponsors==&lt;br /&gt;
[[Image:xing_logo.png|link=https://corporate.xing.com/en/about-xing/security/|www.xing.com]]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
At this time, Dojo is already being used by multiple large enterprises, but there is still many aspects we want to improve. Part of our next steps is to better evangelize our work and encourage others to contribute. However, we do have a set of core contributors that actively work on the project. Feature-wise, we hope to push a proof of concept plugin that will aid in retesting automation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of March, 2016, the highest priorities for the next 6 months are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* A proof of concept plugin that will aid in retesting automation&lt;br /&gt;
* JIRA Integration&lt;br /&gt;
* Dynamic Application Tagging.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* CI / CD for pull requests&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;DefectDojo&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to produce a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer any help.&lt;br /&gt;
&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template DefectDojo project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Template:Project About&lt;br /&gt;
| project_name =OWASP DefectDojo&lt;br /&gt;
| project_description =OWASP DefectDojo is an open source vulnerability management tool that streamlines the testing process by offering templating, report generation, metrics, and baseline self-service tools. &lt;br /&gt;
| project_license = [https://github.com/OWASP/django-DefectDojo/blob/master/LICENSE.md BSD Simplified License]&lt;br /&gt;
| leader_name1=Greg Anderson&lt;br /&gt;
| leader_email1=greg.anderson@owasp.org&lt;br /&gt;
| leader_username1=devgreg&lt;br /&gt;
| leader_name2=Charles Neill&lt;br /&gt;
| leader_email2=charles.neill@owasp.org&lt;br /&gt;
| leader_username2=N/A&lt;br /&gt;
| leader_name3=Jay Paz&lt;br /&gt;
| leader_email3= N/A&lt;br /&gt;
| leader_username3=grendel&lt;br /&gt;
}}  &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Tool]]&lt;br /&gt;
[[Category:Projects|DefectDojo]]&lt;br /&gt;
[[Category:Incubator Projects|DefectDojo]]&lt;br /&gt;
[[Category:OWASP DefectDojo|DefectDojo]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=240334</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=240334"/>
				<updated>2018-04-30T19:25:47Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings Listed on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
[https://www.meetup.com/OWASP-Philadelphia/ Philadelphia OWASP Meetup]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 19 AT 5:45'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' AXINet&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/236793133/&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
5:45 - 6:00 | Introduction and settle-in (Alpine Cyber Solutions)&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:40| Aaron Weaver (Philadelphia OWASP Chapter Lead) Securing AWS with LAMBDA&lt;br /&gt;
&lt;br /&gt;
6:40 - 7:10 | Open Forum - Bring your questions, successes, and stories!&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=240333</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=240333"/>
				<updated>2018-04-30T19:25:00Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: Chapter leader email update.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.kh.baek@gmail.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings Listed on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
[https://www.meetup.com/OWASP-Philadelphia/ Philadelphia OWASP Meetup]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 19 AT 5:45'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' AXINet&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/236793133/&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
5:45 - 6:00 | Introduction and settle-in (Alpine Cyber Solutions)&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:40| Aaron Weaver (Philadelphia OWASP Chapter Lead) Securing AWS with LAMBDA&lt;br /&gt;
&lt;br /&gt;
6:40 - 7:10 | Open Forum - Bring your questions, successes, and stories!&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br /&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br /&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=238914</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=238914"/>
				<updated>2018-03-25T16:39:21Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the sample implementation, documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, code, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://raw.githubusercontent.com/appsecpipeline/AppSecPipeline-Specification/master/reference/diagrams/pipeline-static.png AppSecPipeline Specification Diagram]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
* : An application security utility to assist in the organization and prioritization of software security activities and defect tracking application.&lt;br /&gt;
**Dashboard showing entire application portfolio and last engagement dates&lt;br /&gt;
**Applications requiring engagements&lt;br /&gt;
**Importers for many scanners&lt;br /&gt;
**Integration with Jira&lt;br /&gt;
**API for integration with security tools&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===Dockers Released ===&lt;br /&gt;
*Released [https://hub.docker.com/u/appsecpipeline/ AppSec Docker]&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Specification Released===&lt;br /&gt;
*Beta Release: View the [https://github.com/appsecpipeline/AppSecPipeline-Specification Github repo] and specification&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:Incubator Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:OWASP AppSec Pipeline|AppSec Pipeline]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=238913</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=238913"/>
				<updated>2018-03-25T16:32:59Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the sample implementation, documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, code, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://raw.githubusercontent.com/appsecpipeline/AppSecPipeline-Specification/master/reference/diagrams/pipeline-static.png AppSecPipeline Specification Diagram]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding] : An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec Plugin Index Initial Release ===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: January 10, 2017&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Beta Release: January 10, 2017&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:Incubator Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:OWASP AppSec Pipeline|AppSec Pipeline]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=236128</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=236128"/>
				<updated>2017-12-11T14:40:34Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Pipeline - Deliver */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the sample implementation, documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, code, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSecUS 2016 AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding] : An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec Plugin Index Initial Release ===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: January 10, 2017&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Beta Release: January 10, 2017&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* &lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:Incubator Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:OWASP AppSec Pipeline|AppSec Pipeline]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=236127</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=236127"/>
				<updated>2017-12-11T14:38:21Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the sample implementation, documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, code, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSecUS 2016 AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: October 30, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: October 17, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]&lt;br /&gt;
[[Category:OWASP_Builders]]&lt;br /&gt;
[[Category:OWASP_Defenders]]&lt;br /&gt;
[[Category:OWASP_Document]]&lt;br /&gt;
[[Category:Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:Incubator Projects|AppSec Pipeline]]&lt;br /&gt;
[[Category:OWASP AppSec Pipeline|AppSec Pipeline]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=224829</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=224829"/>
				<updated>2017-01-09T15:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting MON, DEC 5 AT 6 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings Listed on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
[https://www.meetup.com/OWASP-Philadelphia/ Philadelphia OWASP Meetup]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 19 AT 5:45'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' AXINet&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/236793133/&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&lt;br /&gt;
5:45 - 6:00 | Introduction and settle-in (Alpine Cyber Solutions)&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:40| Aaron Weaver (Philadelphia OWASP Chapter Lead) Securing AWS with LAMBDA&lt;br /&gt;
&lt;br /&gt;
6:40 - 7:10 | Open Forum - Bring your questions, successes, and stories!&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=223731</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=223731"/>
				<updated>2016-11-30T01:50:40Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings Listed on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
[https://www.meetup.com/OWASP-Philadelphia/ Philadelphia OWASP Meetup]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''MON, DEC 5 AT 6 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSI Soft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.meetup.com/OWASP-Philadelphia/events/235918332/&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food&lt;br /&gt;
*Enemy's State of Mind, John Baek&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221536</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221536"/>
				<updated>2016-09-19T19:50:28Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Docker AppSec Pipeline Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSecUS 2016 AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: October 30, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: October 17, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221535</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221535"/>
				<updated>2016-09-19T19:49:57Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* AppSec ToolBox Release */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSecUS 2016 AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: October 30, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221534</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221534"/>
				<updated>2016-09-19T19:39:38Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSecUS 2016 AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221533</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221533"/>
				<updated>2016-09-19T19:38:31Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Quick Download */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221532</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221532"/>
				<updated>2016-09-19T19:38:14Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://appsecusa2016.sched.org/event/7t9g/appsec-take-the-best-of-agile-devops-and-cicd-into-your-appsec-program AppSec++ Take the best of Agile, DevOps and CI/CD into your AppSec Program]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221531</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221531"/>
				<updated>2016-09-19T19:36:00Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221530</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221530"/>
				<updated>2016-09-19T19:31:42Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[OWASP_Web_Testing_Environment_Project]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221527</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221527"/>
				<updated>2016-09-19T19:28:45Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[OWASP_Web_Testing_Environment_Project OWASP Web Testing Environment Project]&lt;br /&gt;
&lt;br /&gt;
[http://www.example.com link title]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221526</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221526"/>
				<updated>2016-09-19T19:22:28Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Related Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Web Testing Environment Project OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221525</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221525"/>
				<updated>2016-09-19T19:21:57Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
&lt;br /&gt;
[mailto:adam@parsons.cloud Adam Parsons]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221524</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=221524"/>
				<updated>2016-09-19T19:19:04Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Project Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=221034</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=221034"/>
				<updated>2016-09-05T13:50:23Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== All Meetings Listed on Meetup.com ==&lt;br /&gt;
&lt;br /&gt;
[https://www.meetup.com/OWASP-Philadelphia/ Philadelphia OWASP Meetup]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=220639</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=220639"/>
				<updated>2016-08-23T13:59:51Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Metrics */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Milestones=&lt;br /&gt;
&lt;br /&gt;
===AppSec ToolBox Release===&lt;br /&gt;
*Release AppSec ToolBox and Call for PR: August 31, 2016&lt;br /&gt;
&lt;br /&gt;
===Docker AppSec Pipeline Release===&lt;br /&gt;
*Preview Release: September 10, 2016&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=218295</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=218295"/>
				<updated>2016-06-27T17:44:43Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* News and Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
[https://2016.appsec.eu/?page_id=43 AppSec EU June 2016]&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Metrics=&lt;br /&gt;
&lt;br /&gt;
===TBD===&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=217724</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=217724"/>
				<updated>2016-06-06T20:14:26Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Tuesday, June 14th AT 5:30 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/june-owasp-chapter-meeting-at-osisoft-tickets-25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=217717</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=217717"/>
				<updated>2016-06-06T19:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting THU, MAY 12 AT 5:45 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, June 14th AT 5:30 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' OSISoft&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/publish?crumb=d2cc4245a75261&amp;amp;eid=25911192073&lt;br /&gt;
&lt;br /&gt;
'''Come join us at OSISoft while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*Building a Threat Modeling Practice in 7 Easy Steps, Anurag Agarwal&lt;br /&gt;
*Android Pentesting, Sandeep Jayashankar&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=215986</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=215986"/>
				<updated>2016-04-26T01:21:09Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''THU, MAY 12 AT 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Navy Yard&lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-the-navy-yard-tickets-24938728408&lt;br /&gt;
&lt;br /&gt;
'''Come join us at the Navy Shipyard while we chat about AppSec.'''&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
*Food!&lt;br /&gt;
*The Illusion of Control: Security and Your Software Supply Chain, Derek Weeks&lt;br /&gt;
*Building your Own Security ChatBot, Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Prior Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=212043</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=212043"/>
				<updated>2016-03-29T14:02:24Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting April 12, 2015 from 11:30 AM - 1:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
'''Please RSVP:''' https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=212042</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=212042"/>
				<updated>2016-03-29T14:01:48Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Previous Meeting March 23, 2015 from 5:45 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''April 12, 2015 from 11:30 AM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Cisco, Reading Terminal Room - 301 Lindenwood Dr. Suite 201 , Malvern, PA &lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-in-malvern-at-cisco-tickets-24256973260&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''AppSec Evolved: Continuous Security and Pipelines'''&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
The security community has been slow to follow the lead of software developers and their adoption of process automation. What can we as security professionals glean from the Agile, Lean, DevOps and CI/CD methods implemented by these industry unicorns? This presentation will show how to catch up by providing examples of security being successfully adapted to these models.&lt;br /&gt;
First, we will demonstrate how to configure an automated test harness from traditional manual testing. No need to re-test. Automation has you covered. Next, we’ll take two different companies’ experiences with running AppSec groups, Rackspace / Pearson, and later incorporate the concept of a build pipeline. Finally, we will show what can be done when these procedures are combined with actual year over year results that include 24/7 remediation advice, automated report generation, ChatOps and more. Learn how an Appsec Pipeline can keep your AppSec live productive and sane.&lt;br /&gt;
&lt;br /&gt;
'''Matt BIO:'''&lt;br /&gt;
Matt Tesauro is the CTO of Infintiv, a Senior Software Security Engineer at Pearson and was previously the Senior Product Security Engineer at Rackspace. He is also an Adjunct Professor for the University of Texas Computer Science department teaching the next generation of CS students about Application Security. Matt is broadly experienced information security professional of 15 years specializing in application and cloud security. He has also presented and provided trainings at various international industry events including DHS Software Assurance Workshop, OpenStack Summit, SANS AppSec Summit, AppSec USA, EU and LATAM. His work has included security consulting, penetration testing, threat modeling, code reviews, training and teaching at the University of Texas and Texas A&amp;amp;M University. He is a former board member of the OWASP Foundation and project lead for OWASP AppSec Pipeline &amp;amp; WTE projects. WTE is a collection of application security testing tools. He holds two degrees from A&amp;amp;M University and several security and Linux certifications.&lt;br /&gt;
&lt;br /&gt;
'''Greg BIO:'''&lt;br /&gt;
Greg Anderson is a security professional with diverse experience ranging from vulnerability assessments to intrusion detection and root cause analysis. Though he primarily focuses on cloud security, Greg’s recent endeavors have been centered around incorporating vulnerability assessments into continuous delivery systems.&lt;br /&gt;
Greg’s previous work focused on unconventional attack vectors and how to maximize their impact while avoiding detection. He has presented at DEFCON and LASCON and is a Chapter Leader at OWASP San Antonio.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=210282</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=210282"/>
				<updated>2016-03-02T15:21:54Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''March 23, 2015 from 5:45 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 32nd Floor, Radian - 1500 Market Street Philadelphia Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
RSVP:https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-22477335315&lt;br /&gt;
&lt;br /&gt;
Join us on Wednesday for food while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''Application Event Logging'''&lt;br /&gt;
&lt;br /&gt;
One of the most important sources of information for security threat detection and investigation is often the most neglected in the application development process. We're talking about application event logging - it isn't often sexy or interesting, but it could be the key to detecting an attack or compromise, or may provide the ability to successfully investigate unauthorized activities or operational issues.&lt;br /&gt;
&lt;br /&gt;
If it is so important, then why are application developers not building an event logging framework into every application? And, why are the events that are being logged from many applications useless for security purposes or difficult to consume?&lt;br /&gt;
&lt;br /&gt;
In this session we'll aim to answer these questions:&lt;br /&gt;
 - Why are developers not implementing application logging capabilities?&lt;br /&gt;
 - What mistakes are being made in the events that are logged?&lt;br /&gt;
 - What should be logged?&lt;br /&gt;
 - In what format should events be logged?&lt;br /&gt;
 - What is the difference between security events and operational events? And, should we care about both?&lt;br /&gt;
&lt;br /&gt;
'''Chris McGinley, CISSP, CCE'''&lt;br /&gt;
Chris is a Managing Partner at BTB Security based out of Bala Cynwyd, PA. Chris has been practicing the information security profession for over 10 years and has been in and around the world of IT for nearly 25 years.&lt;br /&gt;
&lt;br /&gt;
'''Static Analysis Programs – Current State and Future Direction'''&lt;br /&gt;
Static analysis has grown in demand over the past decade and is now seen as one of the key practices in many software security initiatives across different industry verticals. When people think of static analysis, they immediately think of tools and automated solutions.&lt;br /&gt;
&lt;br /&gt;
While there are several well-known tool vendors in the marketplace, there is not enough knowledge and experience in successfully implementing such technology in real-world organizations. Successful static analysis program implementation does not come without challenges and involves a progressive time-consuming journey. Effective program implementation should strategically account for people, process, and technology.&lt;br /&gt;
&lt;br /&gt;
This presentation provides a holistic view of how the industry has taken its shape over the past decade, and what organizations need to know when planning for a new static analysis initiative.&lt;br /&gt;
&lt;br /&gt;
'''Mr. Aravind Venkataraman''' is the Director of Cigital’s Static Analysis practice. He has over 8 years of experience in software security and network security. At Cigital (www.cigital.com), he has spent the past 6 years helping a number of Fortune 100 companies build and run software security practices. He has performed planning, advisory and operational roles in building such practices. He specializes in deploying static analysis programs. He has helped several organizations deploy and run static analysis capabilities of different sizes and shapes.&lt;br /&gt;
He presently plays a technical leadership and program advisory role both for internal staff and clients based out of Washington DC.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=209407</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=209407"/>
				<updated>2016-02-22T15:46:04Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. &lt;br /&gt;
&lt;br /&gt;
'''It's 10pm, Do You Know Where Your Access Keys Are?'''&lt;br /&gt;
&lt;br /&gt;
We know that a large number of organizations are using AWS or are planning to. We also know that hackers are targeting organization’s AWS infrastructure. What you may not know, is how hackers are doing this and what you can do about it. &lt;br /&gt;
&lt;br /&gt;
Join us as Ken Johnson, CTO of nVisium, discusses harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, how to secure your environment, and how to answer the question “Our access keys have been stolen, what do we do now?”.&lt;br /&gt;
&lt;br /&gt;
Ken leads nVisium's product development efforts and is responsible for the security of engineering infrastructure and code. Ken co-built the Railsgoat project, an open-source security-centric training platform for Ruby on Rails developers, and is a frequent speaker on both security and development topics - DevOpsDays DC, LASCON, AppSec Cali, OWASP DC, RubyNation.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=208026</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=208026"/>
				<updated>2016-02-03T01:04:39Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Thursday, January 21, 2015 from 6:00 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, February 23, 2015 from 11:45 PM - 1:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''Where:''' 505 Eagleview Dr. Suite 102 Exton, PA&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-corebts-tickets-21285130398&lt;br /&gt;
&lt;br /&gt;
Join us on Tuesday for lunch while we chat about AppSec. Speaker information to follow shortly.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=206827</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=206827"/>
				<updated>2016-01-19T21:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Thursday, January 21, 2015 from 5:00 PM - 7:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 6:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 6:00 PM - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Venture F0rth located on 417 N. 8th  Street&lt;br /&gt;
&lt;br /&gt;
Meetup: http://meetu.ps/2Qn7x3 &lt;br /&gt;
&lt;br /&gt;
Join us on Thursday while we'll be going over XSS in depth, reviewing advanced attacks and frameworks such as BeEF - The Browser Exploitation Framework Project.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=205730</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=205730"/>
				<updated>2016-01-01T15:23:01Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Thursday, January 21, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, January 21, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' TBD&lt;br /&gt;
&lt;br /&gt;
Joint meeting with Philly Shell. Agenda and location coming soon!&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=205729</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=205729"/>
				<updated>2016-01-01T15:21:29Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Meeting Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Past Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=205070</id>
		<title>OWASP AppSec Pipeline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Pipeline&amp;diff=205070"/>
				<updated>2015-12-13T19:40:36Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==The OWASP AppSec Rugged DevOps Pipeline Project==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Rugged DevOps Pipeline Project is the place to find the information you need to increase the speed and automation of your AppSec program.  Using the documentation and references of this project will allow you to setup your own AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
The AppSec pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  AppSec Pipelines takes the &lt;br /&gt;
principles of DevOps and Lean and applies that to an application security program.  The project will gather references, cheat sheets, and specific guidance for tools/software which would compose an AppSec Pipeline.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSec Pipeline Project documentation is licensed under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP AppSec Pipeline Project? ==&lt;br /&gt;
&lt;br /&gt;
The AppSec Pipeline project is a place to gather together information, techniques and tools to create your own AppSec Pipeline.  &lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
[mailto:matt.tesauro@owasp.org Matt Tesauro]&amp;lt;br /&amp;gt;&lt;br /&gt;
[mailto:aaron.weaver2@gmail.com Aaron Weaver]&amp;lt;br/&amp;gt;&lt;br /&gt;
[mailto:matt.konda@owasp.org Matt Konda]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Web_Testing_Environment_Project]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/PearsonEducation/bag-of-holding Bag of Holding]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
== In Print ==&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/weaveraaaron/building-an-appsec-pipeline-keeping-your-program-and-your-life-sane Building an AppSec Pipeline]&amp;lt;br /&amp;gt;&lt;br /&gt;
[http://www.slideshare.net/mtesauro/mtesauro-keynote-appseceu Taking DevOps practices into your AppSec Life]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:New projects.png|100px|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-breakers-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]] &lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_CODE.jpg|link=]]&amp;lt;br /&amp;gt; &amp;lt;br /&amp;gt;[[File:Project_Type_Files_TOOL.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Pipeline Tools=&lt;br /&gt;
&lt;br /&gt;
==What are DevOp Security Pipeline Tools?==&lt;br /&gt;
DevOp security pipeline tools are written with the mindset of API first. The goal is that a security tool will expose all the core functionality of the product as an API. Tools need to have an API so that the 'All the things' can be automated. Each tool will be evaluated with the criteria outlined below including example pipeline use cases.&lt;br /&gt;
&lt;br /&gt;
==Evaluation Criteria==&lt;br /&gt;
&lt;br /&gt;
'''Application Description:''' Overview of the security tool, description and product web page.&amp;lt;br&amp;gt;&lt;br /&gt;
'''API:''' The type of API (REST, SOAP), API coverage (% of total features available via the API) and API Docs.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Position:''' Where in the AppSec pipeline the tool would be best suited to reside&amp;lt;br&amp;gt;&lt;br /&gt;
'''Cloud Scalable:''' Is the tool cloud aware and can the tool scale based on demand?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Runs as a Service:''' Can the tool run as a service or in headless mode?&amp;lt;br&amp;gt;&lt;br /&gt;
'''Pipeline Example:''' Link to an example use case of the tool in the pipeline&amp;lt;br&amp;gt;&lt;br /&gt;
'''Client Libraries:''' What client libraries are written to assist in integration. For example a python or Go library.&amp;lt;br&amp;gt;&lt;br /&gt;
'''CI/CD Plugins:''' Does the tool have CI/CD plugins for integration into a DevOps pipeline. For example a Jenkins plugin.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Data Sent to the Cloud:''' What kind of data, if any, is sent off premise to the cloud? Is there an option to keep all data in-house?&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
&lt;br /&gt;
We are currently working on gathering a list of the current tools and evaluating each tool based on the criteria listed. The goal is to create a one page wiki document of the application.&lt;br /&gt;
&lt;br /&gt;
==Sample Tooling by Phase==&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Tool_Integration.png]]&lt;br /&gt;
&lt;br /&gt;
==Get Involved==&lt;br /&gt;
Interested in participating or having your product included in the review? Contact [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
= Pipeline Design Patterns =&lt;br /&gt;
&lt;br /&gt;
==What is an AppSec Pipeline?==&lt;br /&gt;
&lt;br /&gt;
An AppSec Pipelines takes the principles of DevOps and Lean and applies that to an application security program. An AppSec pipeline is designed for iterative improvement and has the ability to grow in functionality organically over time. When starting out an AppSec Pipeline choose the area that is your greatest pain point and work on a reusable path for all the AppSec activities that follow. &lt;br /&gt;
&lt;br /&gt;
Pipelines have four distinct areas which will be covered in depth. The first is the &amp;quot;Intake process&amp;quot; or &amp;quot;first impression.&amp;quot; This is where customers request AppSec services such as dynamic, static or manual assessments from the AppSec team. The intake process consists of an application repository that a requestor will either choose from a listing of applications or provide the details of the application.  The second part is &amp;quot;triage&amp;quot; where the determination is made for applying the requested services. An application request may have an automated scan in which case a request would be made to conduct a ZAP scan. The third part is &amp;quot;test&amp;quot; which is the heart of the pipeline. It is here where all the AppSec tools are automated, results are fed into a central repository and reviewed for false positives. Finally the end of the pipeline is &amp;quot;deliver&amp;quot; where the results are distributed to the customer. This will vary by organization, however most pipelines will integrate with a defect tracker and will produce summary metrics and reporting for senior management.&lt;br /&gt;
&lt;br /&gt;
The goal of an AppSec Pipeline is to provides a consistent process from the application security team and the constituency which typically is developers, QA, product managers and senior stakeholders. Throughout the process flow each activity has well-defined states. The pipeline relies heavily on automation for repeatable tasks so that the critical resource, AppSec personnel, is optimized.&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec_Pipeline_Rugged_DevOps.png|800px|thumb|left|Rugged DevOps AppSec Pipeline Template]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
===Pipeline - Intake (“First Impression”)===&lt;br /&gt;
The intake portion of the pipeline is one of the most important aspects of the pipeline. It is here where services are requested from the team. Each service request should be clearly stated and defined. For example consider grouping service requests into bundles. An application security assessment usually consists of a dynamic scan, static scan and manual review. Bundle these into one request and title it 'Application Security Assessment'.&lt;br /&gt;
&lt;br /&gt;
The pipeline request should feed into an application repository that keeps track of the metadata on the application, key contacts, prior engagements and current vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
'''Application Metadata'''&amp;lt;br&amp;gt;&lt;br /&gt;
Knowing the background details about an application is an important part of carrying out a successful application assessment. By gathering this data key decisions can be automated. For example if you know that the application being assessed is a critical application, has PII and has 1 million records then you can automatically recommend and or require certain activities. These activities could include a threat model, an automated assessment with manual review.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Key fields recommended for intake are the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*'''Application General Information''':  Name, Brief Description, Business Line&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Application Metadata''':  Business Criticality, Platform, LIfecycle, Origin, User Records, Revenue, External Audience, Internet Accessible&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Technologies''': Coding Language, Data Store, DDoS Protection, Firewall, Framework, Hosting Provider, Operation System, Third-Party Component, Web Server&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Regulations''': Examples: PCI, SOC, FERPA DPA, SOX etc.&amp;lt;br&amp;gt;&lt;br /&gt;
*'''Data Elements''': PII (First name, Last name, Email, Address, Postal Code, Social)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Key Concepts'''&lt;br /&gt;
* Bundle application service requests instead of offering al la carte.&lt;br /&gt;
*Ask for data about applications only once&lt;br /&gt;
*Have data reviewed periodically. (A great time is when new services are requested on the application.)&lt;br /&gt;
&lt;br /&gt;
'''Recommended Tools'''&lt;br /&gt;
A complete listing of tools and review will be in the Pipeline Tools section.&lt;br /&gt;
*[https://github.com/PearsonEducation/bag-of-holding Bag of Holding ]: An application security utility to assist in the organization and prioritization of software security activities.&lt;br /&gt;
**Dashboard showing entire application portfolio and last assessment date&lt;br /&gt;
**Applications requiring assessments&lt;br /&gt;
**Managing the work load for assessments&lt;br /&gt;
**KPI's around application workload&lt;br /&gt;
**Tracking of dev team training and overall maturity&lt;br /&gt;
**Request form for dev/product managers to request an application review&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Triage ===&lt;br /&gt;
* Inbound request triage&lt;br /&gt;
**Ala Carte App Sec&lt;br /&gt;
**Dynamic Testing&lt;br /&gt;
**Static Testing&lt;br /&gt;
**Re-Testing mitigated findings&lt;br /&gt;
**Mix and match based on risk &lt;br /&gt;
&lt;br /&gt;
'''Key Concepts''' &lt;br /&gt;
*Activities can be run in parallel&lt;br /&gt;
*Automation on setup, configuration, data export&lt;br /&gt;
*People focus on customization rather than setup&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Test===&lt;br /&gt;
&lt;br /&gt;
===Pipeline - Deliver===&lt;br /&gt;
Source of truth for all AppSec activities&lt;br /&gt;
*Dedupe / Consolidate findings&lt;br /&gt;
*Normalize scanner data&lt;br /&gt;
*Generate Metrics&lt;br /&gt;
*Push issues to bug trackers&lt;br /&gt;
* Report and metrics automation REST + tfclient&lt;br /&gt;
*Source of many touch points with external teams&lt;br /&gt;
&lt;br /&gt;
===How do I integrate an AppSec Pipeline into my existing pipeline(s)?===&lt;br /&gt;
&lt;br /&gt;
[[File:DevOps_AppSec_Pipline_Integration.png|800px|thumb|left|Example Integration of DevOps and AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==AppSec Pipeline Example #1==&lt;br /&gt;
&lt;br /&gt;
[[File:AppSec-Pipeline-Example.png|800px|thumb|left|Example Rugged DevOps AppSec Pipeline]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Presentations =&lt;br /&gt;
&lt;br /&gt;
'''AppSec Pipeline Presentations'''&lt;br /&gt;
*[https://www.youtube.com/watch?v=1CDSOSl4DQU Building An AppSec Pipeline] Aaron Weaver - AppSec EU 2015 &amp;lt;br /&amp;gt;&lt;br /&gt;
*[https://www.youtube.com/watch?v=tDnyFitE0y4 Taking DevOps Practices Into Your AppSec Life] Matt Tesauro - AppSec EU 2015 &lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOp Interviews'''&lt;br /&gt;
* [http://www.sonatype.org/nexus/2015/09/28/devops-security-and-development-w-matt-tesauro-jez-humble-and-shannon-lietz/ DevOps, Security and Development w/ Matt Tesauro, Jez Humble and Shannon Lietz] AppSec USA 2015&lt;br /&gt;
* [https://youtu.be/h3sw-N2KKfo Pipeline Project Interview] Matt Konda - AppSec USA 2015&lt;br /&gt;
&lt;br /&gt;
'''Rugged DevOps'''&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/ShannonLietz_TheRoadToBeingRugged.pdf The Road to Being Rugged] Shannon Lietz - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/MichaelBrunton-Spall_WhenDevopsMeetsSecurity.pdf When Devops Meets Security] Michael Brunton-Spall - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/DavidEtue_RuggedBuildingMaterialsAndCreatingAgilityWithSecurity.pdf Rugged Building Materials and Creating Agility with Security] David Etue - GOTO 2015&lt;br /&gt;
* [http://gotocon.com/dl/goto-london-2015/slides/JamesWickett_HowToEffectChangeInTheEpistemologicalWastelandOfApplicationSecurity.pdf How to effect change in the Epistemological Wasteland of Application Security] James Wickett - GOTO 2015&lt;br /&gt;
&lt;br /&gt;
=Metrics=&lt;br /&gt;
&lt;br /&gt;
===TBD===&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
Got a question?  &lt;br /&gt;
&lt;br /&gt;
Ask us on Twitter:  &lt;br /&gt;
* [https://twitter.com/appsecpipeline @appsecpipeline] &lt;br /&gt;
* [https://twitter.com/matt_tesauro @matt_tesauro]&lt;br /&gt;
* [https://twitter.com/matt_tesauro @weavera]&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
Besides the project leaders, contributions have been made by:&lt;br /&gt;
&lt;br /&gt;
* [https://github.com/aparsons Adam Parsons] - Bag of Holding&lt;br /&gt;
* Matt Brown - suggestions and review of Bag of Holding&lt;br /&gt;
* Lee Thurlow - suggestions and review of Bag of Holding&lt;br /&gt;
&lt;br /&gt;
= Getting Involved =&lt;br /&gt;
&lt;br /&gt;
Involvement in the DevOps AppSec Pipeline is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert in order to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help:&lt;br /&gt;
&lt;br /&gt;
==Case Studies==&lt;br /&gt;
&lt;br /&gt;
Share your AppSec Pipeline! We would like to gather case studies on how organizations are addressing AppSec at scale. Please email the project leaders to have your case study added. &lt;br /&gt;
&lt;br /&gt;
==Tools==&lt;br /&gt;
&lt;br /&gt;
Is there a tool that is missing from our AppSec tooling review? Has your organization integrated or created a tool that integrates into the AppSec pipeline? Click on the 'Pipeline Tool's to contribute your review/tool. &lt;br /&gt;
&lt;br /&gt;
==Feedback==&lt;br /&gt;
&lt;br /&gt;
Please use our mailing list for feedback:&lt;br /&gt;
* What do like?&lt;br /&gt;
* What don't you like?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- DO NOT ALTER OR REMOVE THE TEXT ON NEXT LINE --&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=204978</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=204978"/>
				<updated>2015-12-10T16:42:52Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: /* Next Meeting Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Radian 32nd Floor, 1500 Market St. 32nd Floor, East Tower Philadelphia, PA 19103&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=204977</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=204977"/>
				<updated>2015-12-10T16:41:30Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, December 15, 2015 from 5:00 PM - 8:00 PM &amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-philadelphia-chapter-meeting-at-radian-tickets-19898696537 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
Come show off your hacking skills as we hack against OWASP Security Shepherd and then listen to a presentation about secure coding.&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  [https://www.owasp.org/images/b/bd/OWASP-IoT.pptx IoT Beyond the Hype]'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203054</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203054"/>
				<updated>2015-11-04T15:25:38Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Title:  IoT Beyond the Hype'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.  &lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203053</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203053"/>
				<updated>2015-11-04T15:25:06Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Title:  IoT Beyond the Hype'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.  &lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203052</id>
		<title>Philadelphia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Philadelphia&amp;diff=203052"/>
				<updated>2015-11-04T15:24:22Z</updated>
		
		<summary type="html">&lt;p&gt;Aaron.weaver2: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Philadelphia|extra=The chapter leaders are [mailto:aaron.weaver2@gmail.com Aaron Weaver], [mailto:john.baek@btbsecurity.com John Baek], and [mailto:justin@madirish.net Justin C. Klein Keane].&lt;br /&gt;
&lt;br /&gt;
Follow us [https://twitter.com/phillyowasp @phillyowasp]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-philadelphia|emailarchives=http://lists.owasp.org/pipermail/owasp-philadelphia}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting '''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:'''Tuesday, November 17, 2015 from 5:00 PM - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:'''OSIsoft 1700 Market Street, Suite 2201 Philadelphia (22nd Floor, signs for the conference room will be posted.)&lt;br /&gt;
&lt;br /&gt;
'''Please [https://www.eventbrite.com/e/owasp-chapter-meeting-at-osisoft-tickets-19402906616 register] so that we can get an accurate count for ordering Pizza.'''&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Title:  IoT Beyond the Hype'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane is the security architect for ThingWorx (http://www.thingworx.com), a PTC business, that makes IoT development framework software.  Justin has over 15 years of experience in the security field and is a major contributor to the OWASP IoT Project (https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project), a member of the Build it Securely group (BuildItSecure.ly), the Securing Smart Cities project (http://securingsmartcities.org), and an official contributor to the Online Trust Alliance feedback to the Federal Trade Commission's proposed guidelines on IoT security and privacy (https://otalliance.org/iot-comments-draft-trust-framework).&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  IoT security is one of the most exciting new fields in the industry, but few understand its scope beyond hacking your connected toaster. Hospitals, industry, and agriculture are all leveraging IoT to realize value from big data, predictive analytics, remote management, and cloud connectivity.  IoT is more than just the next evolution from desktop to web to mobile to cloud.  IoT presents very real, and new, challenges, including machine to machine (M2M) trust, transitive ownership, and more.  The OWASP IoT Project seeks to define this new problem space, enumerate common vulnerabilities, and propose methodologies for secure development.  This talk will provide an overview of the OWASP IoT Project and movement in the problem space that goes well beyond hacking cars and baby monitors.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Title:  Getting out of the Comfort Zone'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver, Associate Director - Application Security, Protiviti&lt;br /&gt;
&lt;br /&gt;
'''Abstract:''' In the last few years the development and operation practices have changed significantly in many organizations. Many organizations are embracing DevOps and what started out as an idea a few years ago with startups and large cloud companies is now being adopted by banks and traditional retailers. We in the security community need to be part of this change or we will be ignored or bypassed. It's time for security to look for news ways to enable change in a secure manner while still allowing the business to move at the speed they require.  &lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, October 20, 2015 from 5:00 PM - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Temple University, SERC (1925 N 12th Street, Philadelphia) room 358&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  OWASP Primer - Security and Penetration Testing'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek, OSCP, CISSP, CISA&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Forthcoming&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting '''Thursday, July 30, 2015 from 11:30 AM - 1:00 PM'''==&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, July 30, 2015 from 11:30 AM - 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Giordano's Pizza  633 E Cypress St, Kennett Square, PA 19348&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Building an AppSec Pipeline'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Are you currently running an AppSec program?  AppSec programs fall into a odd middle ground; highly technical interactions with the dev and ops teams yet a practical business focus is required as you go up the org chart.  How can you keep your far too small team efficient while making sure you meet the needs of the business all while making sure you're catching vulnerabilities as early and often as possible?&lt;br /&gt;
&lt;br /&gt;
This talk will discuss a real world case study of an AppSec Pipeline. The pipeline starts with &amp;quot;Bag of Holding&amp;quot;, an open source web application which helps automate and streamline the activities of your AppSec team.  At the end of the pipeline is ThreadFix to manage all the findings from all the sources. Finally we incorporated a chatbot to tie all the information into one place. This talk will cover the motivation behind an AppSec pipeline, its implementation and how it can help you get the most out of your AppSec program.&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Back to Basics: Application Assessment 101 - Pen Test Using Proxy Tool (Burp Suite Pro/ZAP)'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' John Baek &lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
We will drill down one aspect of web application assessment: web app penetration test. We'll discuss a popular tool for performing web app pen test and what the tester needs to understand to make it a successful/useful assessment. The techniques presented here can be used in your SDLC to look for security flaws (hopefully prior to the production release).&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, September 25th, 2014 from 11:30 AM - 1:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Lunch Meeting Thursday September 25th'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, September 25th, 2014 from 11:30 - 1:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' Protiviti - 50 S 16th St, Philadelphia, PA 19102&lt;br /&gt;
&lt;br /&gt;
Food will be provided, [http://www.eventbrite.com/e/owasp-philly-lunch-meeting-tickets-13142911803 please RSVP].&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Securing The Android Apps On Your Wrist and Face'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Jack Mannino&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Android Wear introduces new ways of interacting with our apps and receiving timely, contextual information from the world around us. Smartphones and tablets are becoming the central point for sending and receiving data from wearables and sensors. Building apps for a wearable world introduces new risks as well as shifts the responsibilities for implementing security controls to other layers.&lt;br /&gt;
&lt;br /&gt;
Many of the same issues we’re familiar with from past Android experiences are still relevant, while some issues are less impactful or not (currently) possible within existing wearables. At the same time, extending the app’s trust boundaries introduces new points of exposure for developers to be aware of in order to proactively defend against attacks. We want to highlight these areas, which developers may not be aware of when adding a wearable component to an existing app. &lt;br /&gt;
&lt;br /&gt;
In this presentation, we will explore how Android Wear works underneath the hood. We will examine its methods of communication, data replication, and persistence options. We will examine how these applications into the Android development ecosystem and the new risks to privacy and security that need to be considered. Our goal isn’t to deter developers from building wearable apps, but to enable them to make strong security decisions throughout development.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO at nVisium and loves solving problems in the field of application security. With experience building, breaking, and securing software, he founded nVisium to invent new and more efficient ways of protecting software. Jack is a huge fan of contributing to open source projects, and leads the OWASP Northern Virginia chapter. In his spare time, he loves to kick around new frameworks and technologies, especially things that run Android and code written in Scala. He’s also an optimistic New York Mets fan, although that optimism slowly fades away every summer.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, March 11, 2014 from 6:00 - 7:30 PM'''  ==&lt;br /&gt;
&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, March 11, 2014 from 6:000 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' 3220 Market St. Room 369&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Proven Strategies for Web Application Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane and Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The rising dominance of the web as an application delivery platform has focused attacker attention squarely on the security of dynamic web applications. Application security is a complex, and shifting, field. Learn about and discuss tested and successful techniques to build safer applications, find flaws before they become vulnerabilities, and deploy applications that can detect, and resist attack.  Includes a discussion of common web application vulnerabilities such as the OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday,August 13th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting '''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday ,August 13th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, [http://www.facilities.upenn.edu/maps/locations/fisher-bennett-hall Fisher-Bennett Hall] room 322&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  HTML5 Security'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane or others&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
HTML 5 Security&lt;br /&gt;
&lt;br /&gt;
While HTML 5 is a wonderful tool for developer, the new features also present some new security challenges.  Security in HTML 5 is a widely varied topic and we may not yet understand all of the security challenges it will bring.  HTML 5 poses a major paradigm shift in the way that web applications are delivered and consumed and time will tell whether this will result in a net positive or negative for security.  The new anti-XSS mitigation features of HTML 5 are amazing, and well worth investigating if you're looking to develop a new application.&lt;br /&gt;
&lt;br /&gt;
Presentation material available at https://sites.sas.upenn.edu/kleinkeane/presentations/html-5-security&lt;br /&gt;
&lt;br /&gt;
'''Reminder:'''&lt;br /&gt;
&lt;br /&gt;
OWASP App Sec USA is coming up in November in NYC (http://appsecusa.org/2013/)!  It's a short trip and an awesome opportunity to hear some really great talks.  If folks want to go, please register with the discount code &amp;quot;Support_PHI&amp;quot; to support the chapter.  Additionally, if you're going to go, it's $50 cheaper if you're an OWASP member, and individual membership only costs $50 (https://owasp.org/index.php/Individual_Member) so join!&lt;br /&gt;
&lt;br /&gt;
'''Upcoming Events:'''&lt;br /&gt;
* Friday, October 11 is [http://drupaldelphia.com/ Drupaldelphia], at the Philadelphia Convention Center&lt;br /&gt;
* Friday-Sunday, October 25-27 is [http://pumpcon.org/ Pumpcon] in Philadelphia, follow [https://twitter.com/pumpcon @pumpcon]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, January 8th, 2013 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania, Fisher-Bennett Hall Hall Room 224'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, January 8th, 2013 from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall Hall Room 224&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Topic:  Capture the Flag Exercise'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin C. Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
NB: Please RSVP to jukeane@sas.upenn.edu for this meeting if you plan to attend so that we can provide sufficient materials for all attendees.&lt;br /&gt;
&lt;br /&gt;
Capture the Flag (CTF) exercise.  Come learn about how web applications are compromised by actually breaking one yourself.  This hands on exercise will guide attendees through common web application vulnerabilities and their potential impact by allowing participants to utilize tools to test and attack a target web application in a controlled environment.  The exercise will include a vulnerable virtual machine image and documentation on one of many possible routes to complete the exercise.  &lt;br /&gt;
&lt;br /&gt;
This meeting will be lead by Justin Klein Keane, a veteran of web application capture the flag exercises and maintainer of the LAMPSecurity project on SourceForge.net (https://sourceforge.net/projects/lampsecurity).  This exercise will be released as part of the LAMPSecurity project after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, November 27th, 2012 from 7:000 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Meyerson Hall, Room B4'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, November 27th from 7:000 - 8:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Meyerson Hall, Room B4, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Penetration Testing - Attack Vector and Vulnerability Trends'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Shannon Schriver and Garrett Fails&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
The more things change, the more they stay the same. Even though the Top Ten hasn't been updated since 2010, the vulnerabilities that are prevalent in the wild in 2012 still map directly to items on the list.&lt;br /&gt;
&lt;br /&gt;
Shannon Schriver and Garrett Fails, penetration testers for PwC, will be discussing the most successful web application vulnerabilities and attack vectors that they have used during client penetration tests in 2012. Topics will include local file inclusion, insecure administrative consoles (including JBoss and Tomcat), and WPAD man-in-the-middle browser vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday April 16th, 2012, from 7:00 - 8:30 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, Monday April 16th from 7:000 - 8:03 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''HECTOR, our evolving security intelligence platform'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter:''' Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
&lt;br /&gt;
Asset management is an ever present challenge for any IT organization,&lt;br /&gt;
and especially so for information security groups.  Even more&lt;br /&gt;
challenging is data aggregation for intelligent security analysis (or&lt;br /&gt;
security intelligence).  HECTOR is an effort by the University of&lt;br /&gt;
Pennsylvania's School of Arts and Sciences to provide such a security&lt;br /&gt;
intelligence platform.  Organizing assets, scanning for vulnerabilities&lt;br /&gt;
and profiles, correlating attacks on your network to services offered by&lt;br /&gt;
hosts, tracking changes, following remediation, and making information&lt;br /&gt;
available to multiple users via a web interface are all goals of HECTOR.&lt;br /&gt;
HECTOR leverages honeypot technology, darknet sensors, port scans,&lt;br /&gt;
vulnerability scans, intrusion detection systems, the powerful open&lt;br /&gt;
source MySQL database, and a PHP based web front end to provide security&lt;br /&gt;
intelligence to security practitioners.  &lt;br /&gt;
&lt;br /&gt;
HECTOR is an evolving, open source effort that attempts to leverage a wide variety of tools and&lt;br /&gt;
information sources to empower security practitioners with better&lt;br /&gt;
insights as well as to track and trend security related data.  Come hear&lt;br /&gt;
about HECTOR in advance the official open source launch at the Educause&lt;br /&gt;
Security Professionals 2012 conference.  Presentation material will&lt;br /&gt;
include a discussion of the philosophy behind HECTOR, the open source&lt;br /&gt;
technologies that make HECTOR work, as well as design challenges and&lt;br /&gt;
solutions.  Even if you don't end up using HECTOR the presentation seeks&lt;br /&gt;
to spur new ideas and ways of thinking about asset management and&lt;br /&gt;
security data.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Friday September 16th, 2011, from 1:00 PM - 4:15 PM'''  ==&lt;br /&gt;
'''Joint Meeting with ISSA-DV, Infragard -  VWR International, Radnor Corporate Center'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Friday September 16th, 1:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' VWR International&lt;br /&gt;
Radnor Corporate Center&lt;br /&gt;
100 Matsonford Road&lt;br /&gt;
Wayne, PA 19087&lt;br /&gt;
&lt;br /&gt;
'''Register:''' [http://www.issa-dv.org/meetings/registration.php Please register to attend this free conference]&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| '''1:00 - 1:15''' &lt;br /&gt;
| '''OWASP, INFRAGARD, ISSA Joint Session'''   &lt;br /&gt;
|''Registration'' &lt;br /&gt;
|-&lt;br /&gt;
|'''1:15 – 2:00''' &lt;br /&gt;
|'''Dan Kuykendall, CTO NT Objectives''' &lt;br /&gt;
|''&amp;quot;Not Your Granddad's Web App.&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:00 – 2:45''' &lt;br /&gt;
|'''Jack Mannino from nVisium Security''' &lt;br /&gt;
|''&amp;quot;Building Secure Android Apps&amp;quot;''&lt;br /&gt;
|-&lt;br /&gt;
|'''2:30 – 2:45''' &lt;br /&gt;
|'''BREAK'''&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|'''2:45 – 3:30''' &lt;br /&gt;
|'''CEO Matthew Jonkman Emergingthreats.net''' &lt;br /&gt;
|''Open Information Security Foundation (OISF Suricata)''&lt;br /&gt;
|-&lt;br /&gt;
|'''3:30 – 4:15''' &lt;br /&gt;
|'''Aaron Weaver - OWASP''' &lt;br /&gt;
|''Breaking Botnets: Finding App Vulnerabilities in Botnet Command &amp;amp; Control servers''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Directions to [http://www.mapquest.com/maps?address=100+Matsonford+Rd&amp;amp;city=Radnor&amp;amp;state=PA&amp;amp;zipcode=19087 VWR International]'''&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday June 20th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, June 20th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
''Three lightning round presentations'' - Each presentation will be about 20 minutes long&lt;br /&gt;
&lt;br /&gt;
* Using PHP for Security - Justin C. Klein Keane&lt;br /&gt;
* Perl for AppSec - Darian Anthony Patrick&lt;br /&gt;
* What does your metadata say about your organization? A look at the open source tool Foca - Aaron Weaver&lt;br /&gt;
&lt;br /&gt;
Thanks to Penn for hosting the OWASP event!&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and if the guard asks let him know you are coming to the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, May 23rd, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 231'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, May 23rd from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 231, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'' The Search for Intelligent Life''&lt;br /&gt;
&lt;br /&gt;
'''Synopsis:''' For years organizations have been mining and culling data warehouses to measure every layer of their business right down to the clickstream information of their web sites. These business intelligence tools have helped organizations identify points of poor product performance, highlighting areas of current and potential future demand, key performance indicators, etc. In the information security field we still tend to look at our information in silos. Dedicated engineers solely focused on web application security, network security, compliance and so on, all while bemoaning a lack of information and decision support.&lt;br /&gt;
&lt;br /&gt;
In this talk, Ed will cover some of the many sources of security data publicly available and how to apply them to add context to your security data and tools to help make more intelligent decisions. Ed also points out a number of ways to repurpose information and tools your company is already using in order to glean a clearer view into your security and the threats that may effect it.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Ed Bellis is the CEO of HoneyApps Inc, a vulnerability management Software as a Service that centralizes, correlates, prioritizes and automates the entire stack of security vulnerabilities and remediation workflow. Prior to HoneyApps, Ed served as the Chief Information Security Officer for Orbitz, the well known online travel agency where he built and led the information security program and personnel for over 6 years. Ed has over 18 years experience in information security and technology. &lt;br /&gt;
He is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as IANS Security Forum, SaaScon, AppSec DC, BlackHat, CSO Perspectives, MIS Institute, and several others. Additionally, Ed is a contributing author to the book Beautiful Security by O’Reilly and a blogger on CSO Online.&lt;br /&gt;
&lt;br /&gt;
For a summary of the presentation please see http://www.madirish.net/justin/security-intelligence-philly-owasp-ed-bellis&lt;br /&gt;
&lt;br /&gt;
'''Directions:'''&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, April 11th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, April 11th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Topic: TBD'''&lt;br /&gt;
&lt;br /&gt;
Supervisory Special Agent Brian Herrick of the Philadelphia FBI - Cyber Squad&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Monday, March 7th, from 6:30 - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - Fisher-Bennett Hall - 322'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Monday, March 7th from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, Fisher-Bennett Hall - 322, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''The Power of Code Review'''&lt;br /&gt;
&lt;br /&gt;
Dave Wichers is a cofounder and the Chief Operating Officer (COO) of Aspect Security.&lt;br /&gt;
*As a volunteer to OWASP, Dave is:&lt;br /&gt;
*A member of the OWASP Board,&lt;br /&gt;
*The OWASP Conferences Chair,&lt;br /&gt;
*Project lead and coauthor of the OWASP Top 10,&lt;br /&gt;
*Coauthor of the OWASP Application Security Verification Standard, and&lt;br /&gt;
*Contributor to the OWASP Enterprise Security API (ESAPI) project.&lt;br /&gt;
&lt;br /&gt;
The building entrance faces the intersection of 34th and Walnut&lt;br /&gt;
streets and the room is on the third floor.  Folks should bring&lt;br /&gt;
identification and let the guard know they're coming for the OWASP&lt;br /&gt;
meeting.&lt;br /&gt;
&lt;br /&gt;
For a write up of the meeting please see http://www.madirish.net/justin/owasp-philadelphia-march-7-2011-meeting&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, August 17th, 2010 6:30pm - 8:00pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - 307 Levine Hall'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, August 17th, from 6:30 - 8:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where:''' University of Pennsylvania, 307 Levine Hall, Philadelphia&lt;br /&gt;
&lt;br /&gt;
'''Mobile App Security Techniques'''&lt;br /&gt;
&lt;br /&gt;
Look left, look right, look in your pocket, you probably glanced over a cellular phone. These devices are getting more and more pervasive in today's society. More importantly they are getting very powerful. This new market of software users have been the catalyst of the &amp;quot;app&amp;quot; boom. Everyone is jumping on board and developing mobile applications. This influx of mobile application development means there are a large number of mobile applications that get rushed to the market before they can be properly reviewed from a security standpoint. So guess what, more bugs for the taking!&lt;br /&gt;
&lt;br /&gt;
In this talk we will lay out a few basic techniques that we use when we perform mobile application assessments, highlight possible pit falls that one should be aware and hopefully give those up and coming mobile application penetration testers a leg up on the competition.&lt;br /&gt;
&lt;br /&gt;
'''Raj Umadas''' is a Consultant with the Intrepidus Group. Mr. Umadas graduated Summa Cum-Laude from The Polytechnic Institute of NYU with a BS in Computer Engineering. At NYU:Poly, Mr. Umadas pursued a highly expansive computer security curriculum. He is just as comfortable sniffing out a memory corruption bug as he is assessing the risk management decisions of large projects.&lt;br /&gt;
&lt;br /&gt;
Coupled with Mr. Umadas' fresh academic outlook on security, he obtained a no-nonsense business sense of security while working in an Information Risk Management arm of a large investment bank. Corporate governance, segregation of duties, and SOX compliance were all daily concerns for Mr. Umadas.&lt;br /&gt;
&lt;br /&gt;
Mr. Umadas is eager to establish his own niche in the security world where he will be the catalyst of some very major innovation. With his strong academics, proven real world experience, and never-say-no attitude; it is only a matter of time.&lt;br /&gt;
&lt;br /&gt;
For a summary of this presentation please see http://www.madirish.net/security-tools/470&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Tuesday, July 20th, 2010 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: Tuesday, July 20th, 2010 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Fisher-Bennett Room 401, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3340 Walnut Street St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Balancing Security &amp;amp; Usability, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Arshan Dabirsiaghi - Aspect Security&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Informal meetup afterwards at New Deck&lt;br /&gt;
&lt;br /&gt;
[http://owaspphiladelphia.eventbrite.com/ Please RSVP]&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Fisher-Bennett]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:aaron.weaver2@gmail.com Aaron Weaver]&lt;br /&gt;
&lt;br /&gt;
'''User Interface and Security in Web Applications'''&lt;br /&gt;
&lt;br /&gt;
Security is often seen as a competing priority to good user experience, but the two are not diametrically opposed. Good user experience is essential to good security. Without ease of use, most people simply ignore or bypass security protections in systems. In order to craft effective security measures it is essential to take user experience into consideration. With the meteoric growth of web applications as a medium for service delivery it is critical to deploy good security measures. Web applications offer an always on, globally available target for attackers. Users need to be allies in the drive for application security, but far too often security measures are presented as onerous, time consuming, bothersome add-on's to web applications rather than seamlessly integrated, easy to use, user friendly features. In this talk I propose to explore some of the reasons why good security in web applications matters and how you can make security effective by making it easy to use.&lt;br /&gt;
&lt;br /&gt;
'''Speaker: Justin Klein Keane'''&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Thursday, December 3rd, 2009 6:30pm - 8:30pm'''  ==&lt;br /&gt;
'''OWASP Philly/ Meeting - University of Pennsylvania - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
'''This is a joint meeting with the [http://www.meetup.com/phillyphp/ Philadelphia Area PHP Meetup group]'''. All are welcome to join us on Tuesday as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
When: December 3rd, 2009 6:30pm - 8:30pm&amp;lt;br/&amp;gt;&lt;br /&gt;
Where: Wu &amp;amp; Chen Auditorium, Levine Hall, University of Pennsylvania&amp;lt;br/&amp;gt;&lt;br /&gt;
3330 Walnut St.&lt;br /&gt;
Philadelphia, PA  19104&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Opening Remarks&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Discovering PHP Vulnerabilities Via Code Auditing, Justin Klein Keane&amp;lt;br&amp;gt;&lt;br /&gt;
3.) TBD: Bruce Diamond&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3330+Walnut+St.,+Philadelphia,+Pennsylvania+19104.&amp;amp;sll=39.953372,-75.191352&amp;amp;sspn=0.006678,0.013797&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=3330+Walnut+St,+Philadelphia,+Pennsylvania+19104&amp;amp;ll=39.954787,-75.191352&amp;amp;spn=0.006678,0.013797&amp;amp;z=16&amp;amp;iwloc=A&amp;amp;iwstate1=dir Directions to Levine Hall]&lt;br /&gt;
&lt;br /&gt;
Questions should be directed to [mailto:darian@criticode.com Darian Anthony Patrick]&lt;br /&gt;
&lt;br /&gt;
'''Discovering PHP Vulnerabilities Via Code Auditing'''&lt;br /&gt;
&lt;br /&gt;
Abstract: PHP provides an accessible, easy to use platform for developing dynamic&lt;br /&gt;
web applications.  As the number of web based applications grow, so too&lt;br /&gt;
does the threat from external attackers.  The open and global nature of&lt;br /&gt;
the web means that web applications are exposed to attack from around&lt;br /&gt;
the world around the clock.  Automated web application vulnerability&lt;br /&gt;
scanning technology is still very much in its infancy, and unable to&lt;br /&gt;
identify complex vulnerabilities that could lead to complete server&lt;br /&gt;
compromise.  While intrusion detection systems prove very valuable in&lt;br /&gt;
detecting attacks, the best way to prevent vulnerabilities is to engage&lt;br /&gt;
in active code review.  There are many advantages of direct code review&lt;br /&gt;
over automated testing, from the ability to identify complex edge&lt;br /&gt;
scenario vulnerabilities to finding non-exploitable flaws and fixing&lt;br /&gt;
them proactively.  Many vulnerabilities in PHP based web applications&lt;br /&gt;
are introduced with common misuse of the language or misunderstanding of&lt;br /&gt;
how functions can be safely utilized.  By understanding the common ways&lt;br /&gt;
in which vulnerabilities are introduced into PHP code it becomes easy to&lt;br /&gt;
quickly and accurately review PHP code and identify problems.  In&lt;br /&gt;
addition to common problems, PHP includes some obscure functionality&lt;br /&gt;
that can lead developers to unwittingly introduce vulnerabilities into&lt;br /&gt;
their applications.  By understanding the security implications of some&lt;br /&gt;
common PHP functions, code reviewers can pinpoint the use of such&lt;br /&gt;
functions in code and inspect them to ensure safety.&lt;br /&gt;
&lt;br /&gt;
Speaker: Justin Klein Keane&lt;br /&gt;
&lt;br /&gt;
Bio: Justin C. Klein Keane has over 8 years of experience in information&lt;br /&gt;
security starting with his role as Editor in Chief of the Hack in the&lt;br /&gt;
Box e-zine.  Currently Justin works as in Information Security&lt;br /&gt;
Specialist with the University of Pennsylvania School of Arts and&lt;br /&gt;
Sciences' Information Security and Unix Systems group.  Justin's past&lt;br /&gt;
work included several positions as a web application developer, often&lt;br /&gt;
utilizing PHP.  Justin is a regular contributer to the Full-Disclosure&lt;br /&gt;
mailing list and is credited with dozens of vulnerability discoveries.&lt;br /&gt;
Justin holds several ethical hacking and penetration testing&lt;br /&gt;
certifications and regularly posts computer security related articles on&lt;br /&gt;
his website http://www.MadIrish.net.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''October 27th, 2009 6:00pm - 9:00pm'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - Comcast - Philadelphia'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Presentations:&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/7/79/Agile_Practices_and_Methods.ppt Agile Practices and Methods]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/d/d0/OWASP-AJAX-Final.ppt AJAX Security]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/0/06/Adobe_AMF.ppt Adobe AMF]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Food and space provided by Comcast.&lt;br /&gt;
&lt;br /&gt;
'''Sponsor:'''&lt;br /&gt;
[[Image:comcastlogo.gif]]&lt;br /&gt;
&lt;br /&gt;
When: October 27th, 2009 6:00pm - 9:00pm&lt;br /&gt;
Where: Floor (TBD), Comcast, 1701 John F Kennedy Blvd Philadelphia, PA  08054&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Meeting Opening Remarks: Bruce A. Kaalund Director, Product Security&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Development Issues Within AJAX Applications: How to Divert Threats: Tom Tucker, Cenzic&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Agile Software Development Principles and Practices : Ravindar Gujral, Agile Philadelphia&amp;lt;br&amp;gt;&lt;br /&gt;
4.) Testing Adobe Flex/SWF's, focusing on flash remoting (AMF): Aaron Weaver, Pearson eCollege&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1701+John+F+Kennedy+Blvd+philadelphia&amp;amp;sll=39.954255,-75.16839&amp;amp;sspn=0.006908,0.013711&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=1701+John+F+Kennedy+Blvd,+Philadelphia,+Pennsylvania+19103&amp;amp;ll=39.956185,-75.168393&amp;amp;spn=0.006908,0.013711&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A Directions to Comcast]&lt;br /&gt;
&lt;br /&gt;
'''Development Issues Within AJAX Applications: How to Divert Threats'''&lt;br /&gt;
&lt;br /&gt;
Speaker: Tom Tucker&lt;br /&gt;
&lt;br /&gt;
Bio: Tom Tucker has over 25 years of experience within the enterprise hardware, software, network, and security market.  As a Senior Systems Engineer at Cenzic, Tom works directly with customers to protect their Web applications from hacker attacks.  Previously Tom's worked with Tier 1 and Tier 2 Network Service Providers such as BBN, GTE, AT&amp;amp;T, iPass, New Edge Networks and MegaPath Networks, designing firewall, VPN, WAN, LAN and Hosting solutions. Tom was also the Director of Intranet Engineering for Associates Information Services (now a part of Citigroup) implementing secure Internet technology solutions for both internal and external application delivery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Previous Meeting: '''Wednesday June 24th 2009, 6:30 PM - 8:00 PM'''  ==&lt;br /&gt;
'''OWASP Philly Meeting - AccessIT Group - King of Prussia'''&lt;br /&gt;
&lt;br /&gt;
Pizza provided by AccessIT Group.&lt;br /&gt;
&lt;br /&gt;
'''Sponsors:'''&lt;br /&gt;
[[Image:Logo_accessitgroup.gif]][[Image:Sanslogo_vertical.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) OWASP Introduction&amp;lt;br&amp;gt;&lt;br /&gt;
2.) How to Analyze Malicious Flash Programs - Lenny Zeltser&amp;lt;br&amp;gt;&lt;br /&gt;
3.) OWASP .NET, OWASP Report Generator,OWASP Cryttr/Encrypted Syndication - Mark Roxberry&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://atlas.mapquest.com/maps/map.adp?formtype=address&amp;amp;country=US&amp;amp;popflag=0&amp;amp;latitude=&amp;amp;longitude=&amp;amp;name=&amp;amp;phone=&amp;amp;level=&amp;amp;addtohistory=&amp;amp;cat=Access+It+Group+Inc&amp;amp;address=2000+Valley+Forge+Cir&amp;amp;city=King+of+Prussia&amp;amp;state=PA&amp;amp;zipcode=19406 Directions]&lt;br /&gt;
&lt;br /&gt;
2000 Valley Forge Circle&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 106&amp;lt;br&amp;gt;&lt;br /&gt;
King of Prussia, PA 19406&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
AccessIT Group is located in the 2000  Building (middle building) of the Valley&lt;br /&gt;
Forge Towers.  The offices are located on the bottom floor of the&lt;br /&gt;
building.  Parking is available in the front or rear of the building.  &lt;br /&gt;
&lt;br /&gt;
'''How to Analyze Malicious Flash Programs'''&lt;br /&gt;
&lt;br /&gt;
by Lenny Zeltser (http://www.zeltser.com)&lt;br /&gt;
&lt;br /&gt;
'''About the talk:'''&lt;br /&gt;
Attackers increasingly use malicious Flash programs, often in the form of banner ads, as initial infection vectors. Obfuscation techniques and multiple Flash virtual machines complicate this task of analyzing such threats. Come to learn insights, tools and techniques for reverse-engineering this category of browser malware.&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
Lenny Zeltser leads the security consulting practice at Savvis. He is also a board of directors member at SANS Technology Institute, a SANS faculty member, and an incident handler at the Internet Storm Center. Lenny frequently speaks on information security and related business topics at conferences and private events, writes articles, and has co-authored several books. Lenny is one of the few individuals in the world who've earned the highly-regarded GIAC Security Expert (GSE) designation. He also holds the CISSP certification. Lenny has an MBA degree from MIT Sloan and a computer science degree from the University of Pennsylvania. You can stay in touch with him via http://twitter.com/lennyzeltser.&lt;br /&gt;
&lt;br /&gt;
'''OWASP .NET, OWASP Report Generator, OWASP Cryttr / Encrypted Syndication'''&lt;br /&gt;
&lt;br /&gt;
by Mark Roxberry&lt;br /&gt;
&lt;br /&gt;
About the talk:  Mark is looking to generate some interest in participating in OWASP projects.  He will be speaking about projects that he is involved in and hoping to recruit folks who have time, energy and motivation to help out.&lt;br /&gt;
&lt;br /&gt;
Bio:  Mark Roxberry is a frequent contributor of research and code to OWASP.  His credits include OWASP Testing Guide contributor and reviewer, the OWASP .NET Project Lead, the OWASP Report Generator Lead and just recently the OWASP Encrypted Syndication Lead.  He is a Senior Consultant at Database Solutions in King of Prussia.  Mark has a B.S. in Russian Technical Translation from the Pennsylvania State University and has the CEH and CISSP certificates hanging in his bunker where he tries to figure out how to hack into Skynet when it comes online.&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
Next Meeting: &amp;lt;br&amp;gt;'''October 28th 2008, 6:30 PM - 8:00 PM''' &lt;br /&gt;
&amp;lt;br&amp;gt;OWASP Philly Meeting - Protiviti - Two Libery Place Philadelphia&lt;br /&gt;
&lt;br /&gt;
Come join us in Philadelphia as we discuss web application security.&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&amp;lt;br&amp;gt;&lt;br /&gt;
1.) Web Application Security and PCI requirements (V 1.1 and 1.2)&amp;lt;br&amp;gt;&lt;br /&gt;
2.) Clickjacking: What is it and should we be concerned about it?&amp;lt;br&amp;gt;&lt;br /&gt;
3.) Summary of OWASP conference in New York.&lt;br /&gt;
&lt;br /&gt;
[Google Directions][http://maps.google.com/maps?q=50+South+16th+St+Philadelphia,+PA&amp;amp;ie=UTF-8&amp;amp;oe=utf-8&amp;amp;rls=org.mozilla:en-US:official&amp;amp;client=firefox-a&amp;amp;um=1&amp;amp;sa=X&amp;amp;oi=geocode_result&amp;amp;resnum=1&amp;amp;ct=title]&lt;br /&gt;
&lt;br /&gt;
Two Libery Place 50 South 16th St&amp;lt;br&amp;gt;&lt;br /&gt;
Suite 2900&amp;lt;br&amp;gt;&lt;br /&gt;
Philadelphia, PA 19102 USA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Pennsylvania]]&lt;/div&gt;</summary>
		<author><name>Aaron.weaver2</name></author>	</entry>

	</feed>