<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Benjamin+Tomhave</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Benjamin+Tomhave"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Benjamin_Tomhave"/>
		<updated>2026-05-06T10:10:48Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133772</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133772"/>
				<updated>2012-08-02T01:27:09Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
=== Schedule  ===&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Next Meeting  ====&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' August 9th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location:''' [http://www.velocity5.com/locations/centreville/ Velocity 5 in Centreville, VA]&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* Annual Social!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Speakers  ====&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== July 2012 ===&lt;br /&gt;
'''Date/Time:''' July 12th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: [https://www.owasp.org/index.php/John_Steven| John Steven] - &amp;quot;Password Storage Security&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;Password Storage Security&amp;quot; [https://www.owasp.org/images/7/78/PSM_-_Problem_Definition.pdf|Password Storage Security.pdf] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
During the June meeting we discussed the LinkedIn password theft which was just beginning its the news cycle. We'll use the July chapter meeting to discuss issues around password hashing and a solution. While wholly different schemes for protecting passwords at rest are preferable, it's instructive to look at hashing passwords as a threat modeling exercise and take the time to follow through to a fix. &lt;br /&gt;
&lt;br /&gt;
To read up on the issue, look at my latest blog post on the topic: [http://goo.gl/sGyi8|Justice League Blog - Securing Password Storage]&lt;br /&gt;
&lt;br /&gt;
For those who were sufficiently intrigued, mystified, or inspired by the presentation on password protection at the last chapter meeting, Coursera is offering a free 6-week Stanford course on cryptography that begins on August 27th (&amp;quot;Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!&amp;quot;): [https://www.coursera.org/course/crypto|Crypto Course] &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
See  [https://www.owasp.org/index.php/John_Steven| John Steven Bio]&lt;br /&gt;
&lt;br /&gt;
=== June 2012 ===&lt;br /&gt;
'''Date/Time:''' June 7th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot; [https://www.owasp.org/images/e/e9/Ken_Johnson_July_2012.pptx|AppSec, Ritalin, and Failing Fast.pptx] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133771</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133771"/>
				<updated>2012-08-02T01:23:20Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' August 9th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location:''' [http://www.velocity5.com/locations/centreville/ Velocity 5 in Centreville, VA]&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* Annual Social!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== July 2012 ===&lt;br /&gt;
'''Date/Time:''' July 12th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: [https://www.owasp.org/index.php/John_Steven| John Steven] - &amp;quot;Password Storage Security&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;Password Storage Security&amp;quot; [https://www.owasp.org/images/7/78/PSM_-_Problem_Definition.pdf|Password Storage Security.pdf] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
During the June meeting we discussed the LinkedIn password theft which was just beginning its the news cycle. We'll use the July chapter meeting to discuss issues around password hashing and a solution. While wholly different schemes for protecting passwords at rest are preferable, it's instructive to look at hashing passwords as a threat modeling exercise and take the time to follow through to a fix. &lt;br /&gt;
&lt;br /&gt;
To read up on the issue, look at my latest blog post on the topic: [http://goo.gl/sGyi8|Justice League Blog - Securing Password Storage]&lt;br /&gt;
&lt;br /&gt;
For those who were sufficiently intrigued, mystified, or inspired by the presentation on password protection at the last chapter meeting, Coursera is offering a free 6-week Stanford course on cryptography that begins on August 27th (&amp;quot;Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!&amp;quot;): [https://www.coursera.org/course/crypto|Crypto Course] &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
See  [https://www.owasp.org/index.php/John_Steven| John Steven Bio]&lt;br /&gt;
&lt;br /&gt;
=== June 2012 ===&lt;br /&gt;
'''Date/Time:''' June 7th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot; [https://www.owasp.org/images/e/e9/Ken_Johnson_July_2012.pptx|AppSec, Ritalin, and Failing Fast.pptx] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133770</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=133770"/>
				<updated>2012-08-02T01:22:20Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' August 9th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location:''' [http://www.velocity5.com/locations/centreville/], Velocity 5 in Centreville, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* Annual Social!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== July 2012 ===&lt;br /&gt;
'''Date/Time:''' July 12th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: [https://www.owasp.org/index.php/John_Steven| John Steven] - &amp;quot;Password Storage Security&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;Password Storage Security&amp;quot; [https://www.owasp.org/images/7/78/PSM_-_Problem_Definition.pdf|Password Storage Security.pdf] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
During the June meeting we discussed the LinkedIn password theft which was just beginning its the news cycle. We'll use the July chapter meeting to discuss issues around password hashing and a solution. While wholly different schemes for protecting passwords at rest are preferable, it's instructive to look at hashing passwords as a threat modeling exercise and take the time to follow through to a fix. &lt;br /&gt;
&lt;br /&gt;
To read up on the issue, look at my latest blog post on the topic: [http://goo.gl/sGyi8|Justice League Blog - Securing Password Storage]&lt;br /&gt;
&lt;br /&gt;
For those who were sufficiently intrigued, mystified, or inspired by the presentation on password protection at the last chapter meeting, Coursera is offering a free 6-week Stanford course on cryptography that begins on August 27th (&amp;quot;Learn about the inner workings of cryptographic primitives and how to apply this knowledge in real-world applications!&amp;quot;): [https://www.coursera.org/course/crypto|Crypto Course] &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
See  [https://www.owasp.org/index.php/John_Steven| John Steven Bio]&lt;br /&gt;
&lt;br /&gt;
=== June 2012 ===&lt;br /&gt;
'''Date/Time:''' June 7th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot; [https://www.owasp.org/images/e/e9/Ken_Johnson_July_2012.pptx|AppSec, Ritalin, and Failing Fast.pptx] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=132929</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=132929"/>
				<updated>2012-07-12T12:38:44Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' July 12th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: John Steven (Cigital) speaking on doing authentication and password management better&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova071212.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== June 2012 ===&lt;br /&gt;
'''Date/Time:''' June 7th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=131111</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=131111"/>
				<updated>2012-06-07T20:34:18Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' June 7th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova06072012.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=129908</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=129908"/>
				<updated>2012-05-15T14:33:52Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' June 6th, 2012 @ 6:30pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home LivingSocial], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: Ken Johnson (LivingSocial) - &amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
* Firetalks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova06072012.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:'''&lt;br /&gt;
&amp;quot;AppSec, Ritalin, and Failing Fast&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
In early April Ken Johnson and Matt Ahrens presented a high-level overview of building an Application Security program at LivingSocial. This talk will differ in that it will focus on the granular aspects involved with introducing security into an incredibly intense development environment. The discussion will be compromised of experiences in:&lt;br /&gt;
* Developing technical solutions to solving difficult challenges&lt;br /&gt;
* Remaining proactive with an increased workload&lt;br /&gt;
* What it means to innovate&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Ken Johnson is the Application Security Manager for LivingSocial.com. Prior to joining LivingSocial.com, Ken worked in various application security consulting roles. Ken is the primary developer of the Web Exploitation Framework (wXf) and enjoys contributing to other open source projects as often as time permits. Ken has spoken at AppSec DC 2010 &amp;amp; 2012, OWASP DC and Phoenix chapters and is a member of the Attack Research Team.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== May 2012 ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* &amp;quot;Chill Out&amp;quot; conversations (formal talked pushed back due to logistical issues)&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
* Firetalks!&lt;br /&gt;
* ISSA NoVA Social @Champps! &amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=128649</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=128649"/>
				<updated>2012-04-26T21:07:39Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' May 3rd, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Starting a Security Group&amp;quot; by Ken Johnson&lt;br /&gt;
 # Firetalks!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova05032012.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;TBD: TBD&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
 # Firetalks!&lt;br /&gt;
 # ISSA NoVA Social @Champps!&lt;br /&gt;
&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=128648</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=128648"/>
				<updated>2012-04-26T21:02:45Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' May 3rd (TENTATIVE) 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Starting a Security Group&amp;quot; by Ken Johnson&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova05032012.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;TBD: TBD&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
TBD.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2012 ===&lt;br /&gt;
'''Date/Time:''' April 16th, 2012 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://corporate.livingsocial.com/home Living Social], 11600 Sunrise Valley Drive, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' Jeremy Long - jeremy.long[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot; by Masha Khainson (Cigital)&lt;br /&gt;
 # Firetalks!&lt;br /&gt;
 # ISSA NoVA Social @Champps!&lt;br /&gt;
&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Malicious Code Detection or BRIC Breaking Through Static Analysis&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Malicious Code Detection or BRIC Breaking Through Static Analysis: As&lt;br /&gt;
organizations outsource development to less trustworthy providers&lt;br /&gt;
malware becomes as much a problem as introduction of honest&lt;br /&gt;
vulnerability by one's own development shop. Assessment practices&lt;br /&gt;
currently look for vulnerability within source code and a running&lt;br /&gt;
systems but these are but a few of windows of opportunity for malware&lt;br /&gt;
introduction. This presentation demonstrates an approach for&lt;br /&gt;
augmenting an existing security practice with the capability to detect&lt;br /&gt;
potentially malicious code through secure code review. First, we show&lt;br /&gt;
how to break malicious intent--often quite subtle--into concrete&lt;br /&gt;
patterns we can reliably detect. The framework then demonstrates how&lt;br /&gt;
to build suspicion around reliance of particular patterns' use in&lt;br /&gt;
concert which, increasingly, imply malicious intent. These techniques&lt;br /&gt;
will be explained through a demonstration in a real world application.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
Masha (a.k.a Marina) has dreamed of becoming a security consultant&lt;br /&gt;
before she ever knew what a ballerina was, and that's a good thing -&lt;br /&gt;
because she does not intend her talk to be a ballet recital. Having&lt;br /&gt;
been in software security for over seven years, Ms. Khainson has&lt;br /&gt;
delivered Architecture Risk Assessment, Secure Code Review, and&lt;br /&gt;
Ethical Hacking on many architectures, platforms and technologies.&lt;br /&gt;
Marina has also developed training materials for clients and led&lt;br /&gt;
remediation assistance teams.&lt;br /&gt;
&lt;br /&gt;
Prior to joining Cigital, Marina was a member of a research team at a&lt;br /&gt;
leading security research provider, where using disassembly as well as&lt;br /&gt;
protocol and source code analysis, she provided key information on&lt;br /&gt;
newly released vulnerabilities. Before that, Marina assisted the same&lt;br /&gt;
research team in producing detailed reports on critical malware and&lt;br /&gt;
spyware threats, as well as developing and testing content for network&lt;br /&gt;
security devices from some of the top providers of intrusion detection&lt;br /&gt;
and prevention technologies.&lt;br /&gt;
&lt;br /&gt;
Download: https://www.owasp.org/index.php/File:MCD-OWASPNoVA.pdf&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/ctxt http://twitter.com/ctxt] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=120571</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=120571"/>
				<updated>2011-11-21T22:35:27Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' December 1st, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 11091 Sunset Hills Road, ''1st floor (Rooms 207/208)'', Reston VA 20190&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Cloud Control: Assurance in a Massively Scalable World&amp;quot; by Ben Tomhave&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova120111.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Cloud Control: Assurance in a Massively Scalable World&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Ubiquitous access to data and applications is here. No longer are our resources confined to enterprise networks and data centers of our own making. Rather, applications and platforms are now available on-demand, anywhere, anytime, to virtually anybody. Moreover, these environments can scale on demand, automating what has traditionally required expertise in system design and capacity planning. Assuring security in this environment poses new and evolving challenges. While they may resemble the same obstacles we've been managing for decades, they are increasingly more difficult to address. Now, more than ever, companies need to extend their governance, risk, and compliance initiatives to take cloud-related strategies and initiatives into account to proactively protect their data and their bottom line.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:benjamin.tomhave@owasp.org Ben Tomhave] (Twitter: [http://twitter.com/#!/falconsview @falconsview]) Ben Tomhave, MS, CISSP, helps global enterprises, SMBs and service partners unlock the real promise of integrated governance, risk and compliance in his current role as Principal Consultant for LockPath, a market-changing GRC software company. A distinguished author and experienced speaker, he currently serves on the OWASP NoVA chapter board and as the co-vice-chair of the ABA InfoSec Committee. He is also a member of ISSA and the IEEE Computer Society, and earned a MS in Engineering Management from The George Washington University with an InfoSec Management concentration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== November 2011 ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=119063</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=119063"/>
				<updated>2011-10-14T13:37:14Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk: &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot; by Ryan Barnett (Trustwave SpiderLabs)&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova110311.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Title:''' &amp;quot;Lessons Learned from the SQL Injection Challenge&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
How effective are blacklist filters vs. SQL Injection attacks?  What is the failure rate vs. automated scanning or manual testing?  Are there any &amp;quot;Time-to-Bypass&amp;quot; metrics?  In an attempt to answer these questions, Trustwave SpiderLabs' Research Team (the development team behind the ModSecurity WAF and the OWASP ModSecurity Core Rule Set) held a community &amp;quot;SQL Injection Challenge&amp;quot; to test the effectiveness of the OWASP ModSecurity Core Rule Set protections.  This presentation will provide an overview of the challenge, a step-by-step walk-through of the bypass tactics used by the winners, as well as, present a new approach to attack detection using ModSecurity's Lua API to perform Bayesian analysis.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
[mailto:ryan.barnett@owasp.org Ryan C. Barnett] (Twitter: [http://twitter.com/#!/ryancbarnett @ryancbarnett]) is a senior security researcher on Trustwave's SpiderLabs Team. He is a SANS Institute certified instructor and a member of both the Top 20 Vulnerabilities and CWE/SANS Top 25 Most Dangerous Programming Errors teams. In addition to working with SANS, he is also a WASC Member where he leads the Web Hacking Incidents Database (WHID) and Distributed Web Honeypots Projects and is also the OWASP ModSecurity Core Rule Set (CRS) project leader. Mr. Barnett has also authored a Web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=118972</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=118972"/>
				<updated>2011-10-12T21:25:52Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' November 3rd, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.qinetiq.com/ QinetiQ], 2677 Prosperity Ave Fairfax, VA 22031&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Talk(s) - TBD&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Please [http://owaspnova110311.eventbrite.com/ RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== October 2011 ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=118552</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=118552"/>
				<updated>2011-10-04T17:36:27Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # Talk: Jack Mannino: [http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks &amp;quot;OWASP Top 10 Mobile Risks&amp;quot;]&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Please [http://owaspnova100611.eventbrite.com/ RSVP]'''&lt;br /&gt;
&lt;br /&gt;
MOVED TO NOVEMBER: [https://plus.google.com/115010545042017654487/about John Steven] on &amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Abstract for &amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;: ''How much bang for the buck to you really get from all that application pen testing and source code review? This presentation will present from-the-field evidence to validate the long-held opinions of most appsec professionals: today’s app sec tactics don’t really provide much value. Furthermore, they distract significantly from the objective of improving the security of the software being inspected in many cases due to inadequate understanding of the software’s design, resulting in poor coverage, inhibited automation, and low-yield, adverse-impact remediation.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117746</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117746"/>
				<updated>2011-09-21T14:52:23Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
'''Date/Time:''' October 6th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.cigital.com/ Cigital], 21351 Ridgetop Circle, Suite 400, Sterling, VA 20166 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # AppSec USA 2011 Recap&lt;br /&gt;
 # [https://plus.google.com/115010545042017654487/about John Steven] on &amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;&lt;br /&gt;
 # Other Talks TBD&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Please [http://owaspnova100611.eventbrite.com/ RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Abstract for &amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;: ''How much bang for the buck to you really get from all that application pen testing and source code review? This presentation will present from-the-field evidence to validate the long-held opinions of most appsec professionals: today’s app sec tactics don’t really provide much value. Furthermore, they distract significantly from the objective of improving the security of the software being inspected in many cases due to inadequate understanding of the software’s design, resulting in poor coverage, inhibited automation, and low-yield, adverse-impact remediation.''&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== September 2011 ===&lt;br /&gt;
&lt;br /&gt;
The September meeting was cancelled due to inclement weather (flash flooding).&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117003</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117003"/>
				<updated>2011-09-08T20:39:16Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:red; font-weight:bold; font-size:150%&amp;quot;&amp;gt;&lt;br /&gt;
CANCELLED DUE TO EXTREME WEATHER - BE SAFE!!&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Date/Time:''' September 8th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 # News / Updates&lt;br /&gt;
 # Getting Back On Track...&lt;br /&gt;
 # Mike Smith on HTTP Slow-DDOS Attacks&lt;br /&gt;
 # [https://plus.google.com/115010545042017654487/about John Steven] on &amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;&lt;br /&gt;
 # Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 &lt;br /&gt;
Abstract (&amp;quot;A Boot Camp on Code Understanding: How Modern Framework Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;): How much bang for the buck to you really get from all that application pen testing and source code review? This presentation will present from-the-field evidence to validate the long-held opinions of most appsec professionals: today’s app sec tactics don’t really provide much value. Furthermore, they distract significantly from the objective of improving the security of the software being inspected in many cases due to inadequate understanding of the software’s design, resulting in poor coverage, inhibited automation, and low-yield, adverse-impact remediation.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&amp;lt;/div&amp;gt; &lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117002</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117002"/>
				<updated>2011-09-08T20:30:59Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
fckLRFor more information on how the board was elected and what it's responsibilities are, please see:fckLRfckLR[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;amp;authkey=CIS9zFM Chapter Board Election]fckLRfckLR|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month. &lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''CANCELLED DUE TO EXTREME WEATHER - BE SAFE!!''' &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Date/Time:''' September 8th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Getting Back On Track...&lt;br /&gt;
 * Mike Smith on HTTP Slow-DDOS Attacks&lt;br /&gt;
 * [https://plus.google.com/115010545042017654487/about John Steven] on &amp;quot;A Boot Camp on Code Understanding: How Modern Framework&lt;br /&gt;
 Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 Abstract: How much bang for the buck to you really get from all that application &lt;br /&gt;
 pen testing and source code review? This presentation will present from-the-&lt;br /&gt;
 field evidence to validate the long-held opinions of most appsec professionals: &lt;br /&gt;
 today’s app sec tactics don’t really provide much value. Furthermore, they &lt;br /&gt;
 distract significantly from the objective of improving the security of the &lt;br /&gt;
 software being inspected in many cases due to inadequate understanding of the &lt;br /&gt;
 software’s design, resulting in poor coverage, inhibited automation, and &lt;br /&gt;
 low-yield, adverse-impact remediation.&lt;br /&gt;
 &lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;/div&amp;gt; &lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== August 2011  ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA. &lt;br /&gt;
&lt;br /&gt;
=== July 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt; '''Food Sponsor:'''&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' The College Board&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
 - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''Food Sponsor:''' Akamai&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
 * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
 * Speaker:&amp;amp;nbsp;??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
    * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt; '''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
 * 2011 Election&lt;br /&gt;
 * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
 * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
 * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
 * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
 * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
  * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
  * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
  * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
  * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360! &lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective. &lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History  ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile Mobile]&lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter  ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul] &lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino] &lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview] &lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky] &lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov] &lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks] &lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy] &lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit] &lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity] &lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117001</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=117001"/>
				<updated>2011-09-08T20:30:13Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For more information on how the board was elected and what it's responsibilities are, please see:&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM Chapter Board Election]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''CANCELLED DUE TO EXTREME WEATHER - BE SAFE!!'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' September 8th, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&amp;lt;div style=&amp;quot;width:90%;white-space:pre-wrap&amp;quot;&amp;gt;&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Getting Back On Track...&lt;br /&gt;
 * Mike Smith on HTTP Slow-DDOS Attacks&lt;br /&gt;
 * [https://plus.google.com/115010545042017654487/about John Steven] on &amp;quot;A Boot Camp on Code Understanding: How Modern Framework&lt;br /&gt;
 Dynamism Affects Assessments &amp;amp;amp;&amp;amp;nbsp;Remediation&amp;quot;&lt;br /&gt;
 &lt;br /&gt;
 Abstract: How much bang for the buck to you really get from all that application &lt;br /&gt;
 pen testing and source code review? This presentation will present from-the-&lt;br /&gt;
 field evidence to validate the long-held opinions of most appsec professionals: &lt;br /&gt;
 today’s app sec tactics don’t really provide much value. Furthermore, they &lt;br /&gt;
 distract significantly from the objective of improving the security of the &lt;br /&gt;
 software being inspected in many cases due to inadequate understanding of the &lt;br /&gt;
 software’s design, resulting in poor coverage, inhibited automation, and &lt;br /&gt;
 low-yield, adverse-impact remediation.&lt;br /&gt;
 &lt;br /&gt;
 * Firetalks!&amp;amp;nbsp;:)&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;/div&amp;gt; &lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== August 2011 ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA.&lt;br /&gt;
&lt;br /&gt;
=== July 2011 ===&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011 ===&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' The College Board&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks! :)&lt;br /&gt;
  - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
  - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
  * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
     * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; &lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul]&lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino]&lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview]&lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky]&lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov]&lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks]&lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy]&lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit]&lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity]&lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889]&lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=116756</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=116756"/>
				<updated>2011-09-06T14:33:41Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For more information on how the board was elected and what it's responsibilities are, please see:&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM Chapter Board Election]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
[http://owaspnova09082011.eventbrite.com/ PLEASE RSVP!]&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' September 8th, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location/Food Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Getting Back On Track...&lt;br /&gt;
 * Mike Smith on HTTP Slow-DDOS Attacks&lt;br /&gt;
 * John Steven on (something)&lt;br /&gt;
 * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We need speakers and topics! If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== August 2011 ===&lt;br /&gt;
&lt;br /&gt;
We held a &amp;quot;social&amp;quot; event at Sweetwater Tavern in Sterling, VA.&lt;br /&gt;
&lt;br /&gt;
=== July 2011 ===&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
=== June 2011 ===&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' The College Board&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks! :)&lt;br /&gt;
  - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
  - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
  * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
     * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &amp;lt;br&amp;gt;&lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm &amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 &amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; &lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul]&lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino]&lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview]&lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky]&lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov]&lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks]&lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy]&lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit]&lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity]&lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889]&lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=113234</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=113234"/>
				<updated>2011-06-30T12:40:52Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For more information on how the board was elected and what it's responsibilities are, please see:&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM Chapter Board Election]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
[http://owaspnova07072011.eventbrite.com/ PLEASE RSVP!]&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
==========================================================&lt;br /&gt;
I'll start by discussing briefly some of the underlying platform weaknesses on &lt;br /&gt;
iOS, and how the developer has to work around those weaknesses in order &lt;br /&gt;
to create reasonably secure apps. Next, I'll describe where iGoat can fit into &lt;br /&gt;
that as a learning tool for iOS developers to really understand the platform &lt;br /&gt;
issues they face. I'll demonstrate iGoat and step through a couple of the &lt;br /&gt;
exercises to illustrate how it works. Lastly, I'll show the internals of iGoat to &lt;br /&gt;
illustrate how others can easily add new lessons into iGoat.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
==========================================================&lt;br /&gt;
&lt;br /&gt;
* Firetalks! :)&lt;br /&gt;
** Others!&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== June 2011 ===&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&lt;br /&gt;
'''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&lt;br /&gt;
'''Food Sponsor:''' The College Board&lt;br /&gt;
'''AGENDA:'''  &lt;br /&gt;
 * News / Updates&lt;br /&gt;
 * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
 * College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
 * Firetalks! :)&lt;br /&gt;
  - Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
  - Others!&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
'''Food Sponsor:''' Akamai&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
  * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
     * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul]&lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino]&lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview]&lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky]&lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov]&lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks]&lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy]&lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit]&lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity]&lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889]&lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=113233</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=113233"/>
				<updated>2011-06-30T12:36:56Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra =Come see us at a chapter meeting, jump on our Google Group, or email any of us directly.&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board ===&lt;br /&gt;
Previously having had a Chapter Leader, then a Chapter &amp;quot;Program Committee&amp;quot;, the chapter is now run by a full board (alphabetical order):&lt;br /&gt;
&lt;br /&gt;
* Jeremy Long&lt;br /&gt;
* Jack Mannino&lt;br /&gt;
* John Steven - Board Chair&lt;br /&gt;
* Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
Board member responsibilities include:&lt;br /&gt;
&amp;lt;pre style=&amp;quot;white-space: pre-wrap;&amp;quot;&amp;gt;&lt;br /&gt;
   * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics&lt;br /&gt;
   * Recruiting OWASP membership&lt;br /&gt;
   * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
   * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
   * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
   * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
   * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations&lt;br /&gt;
   * Collecting and auditing use of chapter funds&lt;br /&gt;
   * Voting on chapter matters&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
For more information on how the board was elected and what it's responsibilities are, please see:&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM Chapter Board Election]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=https://groups.google.com/forum/#!forum/owasp-nova|emailarchives=https://groups.google.com/forum/#!forum/owasp-nova}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
[http://owaspnova07072011.eventbrite.com/ PLEASE RSVP!]&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' July 7th, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.cigital.com Cigital], Suite 400 21351 Ridgetop Circle, Dulles, VA, 20166&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Topic of the Month: iGoat - Ken Van Wyk&lt;br /&gt;
&lt;br /&gt;
==========================================================&lt;br /&gt;
I'll start by discussing briefly some of the underlying platform weaknesses on &lt;br /&gt;
iOS, and how the developer has to work around those weaknesses in order &lt;br /&gt;
to create reasonably secure apps. Next, I'll describe where iGoat can fit into &lt;br /&gt;
that as a learning tool for iOS developers to really understand the platform &lt;br /&gt;
issues they face. I'll demonstrate iGoat and step through a couple of the &lt;br /&gt;
exercises to illustrate how it works. Lastly, I'll show the internals of iGoat to &lt;br /&gt;
illustrate how others can easily add new lessons into iGoat.&lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_iGoat_Project&lt;br /&gt;
&lt;br /&gt;
==========================================================&lt;br /&gt;
&lt;br /&gt;
* Firetalks! :)&lt;br /&gt;
** Others!&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
'''Food Sponsor:''' Akamai&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
  * '''Update:''' All election candidates were elected by voice vote. &lt;br /&gt;
     * Please see: [https://docs.google.com/document/d/1h8GTqsWg2xiTwWAWS-Ra6_GU4eJGt44aa1hFc9EQloU/edit?hl=en_US&amp;amp;authkey=CIS9zFM '11 Chapter Board Election Material]&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
=== OWASP NoVa Members On Twitter ===&lt;br /&gt;
&lt;br /&gt;
John Steven [http://twitter.com/m1splacedsoul http://twitter.com/m1splacedsoul]&lt;br /&gt;
&lt;br /&gt;
Jack Mannino [http://twitter.com/jack_mannino http://twitter.com/jack_mannino]&lt;br /&gt;
&lt;br /&gt;
Ben Tomhave [http://twitter.com/falconsview http://twitter.com/falconsview]&lt;br /&gt;
&lt;br /&gt;
Ken Johnson [http://twitter.com/cktricky http://twitter.com/cktricky]&lt;br /&gt;
&lt;br /&gt;
Mike Smith [http://twitter.com/rybolov http://twitter.com/rybolov]&lt;br /&gt;
&lt;br /&gt;
Trevor Hawthorn [http://twitter.com/packetwerks http://twitter.com/packetwerks]&lt;br /&gt;
&lt;br /&gt;
Joey Tyson [http://twitter.com/theharmonyguy http://twitter.com/theharmonyguy]&lt;br /&gt;
&lt;br /&gt;
Jeremy Long [http://twitter.com/long_twit http://twitter.com/long_twit]&lt;br /&gt;
&lt;br /&gt;
Ari Elias-Bachrach [http://twitter.com/angelofsecurity http://twitter.com/angelofsecurity]&lt;br /&gt;
&lt;br /&gt;
Venkat Sundaram [http://twitter.com/Vnk3889 http://twitter.com/Vnk3889]&lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=111842</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=111842"/>
				<updated>2011-06-06T20:34:34Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' The College Board&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
* News / Updates&lt;br /&gt;
* Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
* College Board Speaker: &amp;quot;Attack-in-Depth:  Exploits of the OWASP Top Ten in Action&amp;quot;&lt;br /&gt;
* Firetalks! :)&lt;br /&gt;
** Jack Mannino: &amp;quot;Android Security 101&amp;quot;&lt;br /&gt;
** Others!&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova060911.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
'''Food Sponsor:''' Akamai&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=110704</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=110704"/>
				<updated>2011-05-18T16:05:10Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' June 9th, 2011 @ 6pm (*Note: 2nd Thursday of June!)&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://about.collegeboard.org/ The College Board], 11955 Democracy Drive Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' The College Board&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * Topic of the Month: [https://www.owasp.org/index.php/Top_10_2010-A4 A4 &amp;quot;Insecure Direct Object References&amp;quot;]&lt;br /&gt;
  * Speakers: TBD&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova060911.eventbrite.com/ Please RSVP]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== May 2011 ===&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
'''Food Sponsor:''' Akamai&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=109844</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=109844"/>
				<updated>2011-04-30T11:18:38Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset Hills Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/050511owaspnova Please RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=109196</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=109196"/>
				<updated>2011-04-19T15:52:39Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' TBD &lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (voice vote on the entire slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speaker: Steve Witmer on A3 from the &amp;quot;breakers&amp;quot; perspective&lt;br /&gt;
  * Speaker: ??? on A3 from the &amp;quot;fixers/defenders&amp;quot; perspective&lt;br /&gt;
  * Firetalks! :)&lt;br /&gt;
&lt;br /&gt;
'''RSVP TBD''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=108758</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=108758"/>
				<updated>2011-04-13T14:41:56Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' TBD &lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (likely voice vote on the slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speakers: TBD&lt;br /&gt;
&lt;br /&gt;
'''RSVP TBD''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson ([https://www.owasp.org/images/9/92/Xssnotfriend-edited.pptx PPTX] or [https://www.owasp.org/images/0/06/Xssnotfriend-edited.pdf PDF])&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin ([https://www.owasp.org/images/6/66/XSS_Remediation.ppt PPT])&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xssnotfriend-edited.pdf&amp;diff=108756</id>
		<title>File:Xssnotfriend-edited.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xssnotfriend-edited.pdf&amp;diff=108756"/>
				<updated>2011-04-13T14:36:32Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: PDF version of Joey Tyson's April 2011 presentation to OWASP NoVA about A2 Cross-Site Scripting weaknesses and how they can be exploited in Facebook applications.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PDF version of Joey Tyson's April 2011 presentation to OWASP NoVA about A2 Cross-Site Scripting weaknesses and how they can be exploited in Facebook applications.&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Xssnotfriend-edited.pptx&amp;diff=108755</id>
		<title>File:Xssnotfriend-edited.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Xssnotfriend-edited.pptx&amp;diff=108755"/>
				<updated>2011-04-13T14:35:40Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: Presentation for OWASP NoVA in April 2011 by Joey Tyson on A2 Cross-Site Scripting (XSS) vulnerabilities, with a specific look at exploiting Facebook applications.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation for OWASP NoVA in April 2011 by Joey Tyson on A2 Cross-Site Scripting (XSS) vulnerabilities, with a specific look at exploiting Facebook applications.&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:XSS_Remediation.ppt&amp;diff=108754</id>
		<title>File:XSS Remediation.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:XSS_Remediation.ppt&amp;diff=108754"/>
				<updated>2011-04-13T14:34:34Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: Presentation deck from OWASP NoVA April 2011 talk by Cassia Martin (Cigital) on remediation A2 Cross-Site Scripting (XSS) weaknesses.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Presentation deck from OWASP NoVA April 2011 talk by Cassia Martin (Cigital) on remediation A2 Cross-Site Scripting (XSS) weaknesses.&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=108753</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=108753"/>
				<updated>2011-04-13T14:20:09Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' Cinco de Mayo (May 5th), 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' TBD &lt;br /&gt;
'''Food Sponsor:''' TBD&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election (likely voice vote on the slate)&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A3 A3 &amp;quot;Broken Authentication and Session Management&amp;quot;]&lt;br /&gt;
  * Speakers: TBD&lt;br /&gt;
&lt;br /&gt;
'''RSVP TBD''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== April 2011 ===&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
'''Food Sponsor:''' [https://www.cigital.com Cigital]&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107461</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107461"/>
				<updated>2011-03-24T13:07:34Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Jack Mannino (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jeremy Long'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To help grow chapter membership, ensure presentations are vendor neutral stance with sufficient technical depth, and to assist in organizing regularly scheduled meetings.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107412</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107412"/>
				<updated>2011-03-23T14:09:25Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV), Ben Tomhave (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107410</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107410"/>
				<updated>2011-03-23T14:07:59Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
  * Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
  * Recruiting OWASP membership&lt;br /&gt;
  * Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
  * Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
  * Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
  * Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
  * Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
  * Collecting and auditing use of chapter funds&lt;br /&gt;
  * Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
  * Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
  * Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
  * In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
All board members should be prepared to:&lt;br /&gt;
  * Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
  * Stand for election every twenty-four (24) months &lt;br /&gt;
  * Remain absolutely vendor neutral and&lt;br /&gt;
  * Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP Member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I (John) can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy. Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The ''final deadline for candidacy'' will be &amp;quot;close of business&amp;quot; on Friday, April 8th, 2011 (6pm EDT).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both [mailto:John.Steven@owasp.org John Steven] and [mailto:benjamin.tomhave@owasp.org Ben Tomhave] with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107408</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107408"/>
				<updated>2011-03-23T14:00:37Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
&lt;br /&gt;
* Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
* Recruiting OWASP membership&lt;br /&gt;
* Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
* Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
* Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
* Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
* Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
* Collecting and auditing use of chapter funds&lt;br /&gt;
* Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
&lt;br /&gt;
* Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
* Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
* In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
Board members should be prepared to:&lt;br /&gt;
&lt;br /&gt;
* Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
* Stand for election every twenty-four (24) months &lt;br /&gt;
* Remain absolutely vendor neutral and&lt;br /&gt;
* Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy.Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The deadline for candidacy will be the meeting's end, April 7th, 2011, @9pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both John Steven and Ben Tomhave with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Tomhave'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (4HNL4UGE8KP)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: To continue growing chapter membership and participation through maintaining regularly scheduled meetings, ensuring high-quality talk/presentation content, helping facilitate meeting logistics, and by representing the chapter in Global matters (e.g. Global Summit, Global Conferences Committee).&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Benjamin_Tomhave&amp;diff=107406</id>
		<title>User:Benjamin Tomhave</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Benjamin_Tomhave&amp;diff=107406"/>
				<updated>2011-03-23T13:50:02Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ben Tomhave is a Senior Security Analyst with [http://geminisecurity.com Gemini Security Solutions] in Chantilly, VA, specializing in solutions architecture, security planning, security program development and management, and other strategic security solutions.&lt;br /&gt;
&lt;br /&gt;
Ben holds a Master of Science in Engineering Management (Information Security Management concentration) from [http://www.gwu.edu/ The George Washington University]. He is a Certified Information Systems Security Professional (CISSP), co-vice chair of the American Bar Association Information Security Committee, member of ISSA, member of OWASP, and member of the IEEE Computer Society. He is a published author and an experienced public speaker, including recent speaking engagements with RSA US 2010 and 2011, OWASP AppSec DC 2010, and the 2010 ISSA International Conference.&lt;br /&gt;
&lt;br /&gt;
Prior to his current endeavors, Ben has worked in a variety of security roles for companies including BT Professional Services, AOL, Wells Fargo, ICSA Labs, and Ernst &amp;amp; Young.&lt;br /&gt;
&lt;br /&gt;
For more information on Ben, please check out his blog, [http://www.secureconsulting.net/ The Falcon's View]. You can also connect with him on [http://www.linkedin.com/in/btomhave LinkedIn], follow him on [http://twitter.com/falconsview Twitter], or email him at [mailto:benjamin.tomhave@owasp.org benjamin.tomhave[at]owasp[dot]org].&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107397</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=107397"/>
				<updated>2011-03-23T12:44:39Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== '11 Election  ====&lt;br /&gt;
&lt;br /&gt;
===  Letter from Chapter President - John Steven  ===&lt;br /&gt;
All,&lt;br /&gt;
&lt;br /&gt;
I'm proud of how much the Northern Virginia OWASP Chapter has grown in the past two years.  We've increased membership and attendance, and been able to provide you, our constituency, some interesting speakers, panels, and presentations. A single chapter lead has always headed our chapter but last year we saw enough participation and activity we felt the need to add a program committee. Now, we've reached a size where we'd benefit from more leadership and governance.&lt;br /&gt;
&lt;br /&gt;
As you familiarize yourself with OWASP you'll notice two principal memes:&lt;br /&gt;
&lt;br /&gt;
* Conduct operations in as open, transparent, &amp;amp; democratic a manner as possible&lt;br /&gt;
* Prefer progress to discussion--support engaged participants that produce results over promise &lt;br /&gt;
&lt;br /&gt;
To provide better leadership and governance within the two principals' vein, I'm establishing a chapter board to be made of three (3) individuals that share responsibilities described below by the &amp;quot;Chapter Board Responsibilities&amp;quot; section. A fourth chair-person of the board position will be established as well to facilitate overall chapter direction and chapter interaction with global OWASP governing bodies. This chair-person position will replace my current position and as such I will step down and stand for election myself. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;del&amp;gt;I'm going to restrict board membership to verified [http://www.owasp.org/index.php/Membership OWASP Members] but otherwise &amp;lt;/del&amp;gt; anyone and everyone should feel free to run. Procedures for candidacy and election are described by the &amp;quot;Election Procedures&amp;quot; section below. We plan to organize a campaign period in April and conduct the board election during our May chapter meeting.  Board members make a special commitment to facilitate the chapter's logistics, while growing its membership and attendance. &lt;br /&gt;
&lt;br /&gt;
Beyond elected board members, everybody and anybody should feel free to participate in our Northern Virginia OWASP chapter in any capacity they seem beneficial. I encourage individuals to attend chapter meetings, network, explore and consume OWASP resources voraciously. Likewise, I encourage anyone to &amp;quot;take the reigns&amp;quot; and speak, organize, contribute, and direct our chapter as they see fit. As a open, transparent, and member-driven community, OWASP does not require individuals to attain any status or rank before contributing, as long as contributions meet our [http://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project code of ethics]. Indeed, OWASP strives to be a meritocracy. Our new board, once elected, will strive to provide an environment in which all members feel welcome, able, and supported in providing what contributions they can.&lt;br /&gt;
&lt;br /&gt;
So, please join me in participating in our up-and-coming campaign and election proceedings. With your help, I am confident that the Northern Virginia Chapter can take even greater strides towards helping this area's professionals better address our application security challenges,&lt;br /&gt;
&lt;br /&gt;
-jOHN&amp;lt;br&amp;gt;&lt;br /&gt;
John.Steven@owasp.org&amp;lt;br&amp;gt;&lt;br /&gt;
Northern Virginia OWASP Chapter President,&amp;lt;br&amp;gt;&lt;br /&gt;
Phone: 703.727.4034&amp;lt;br&amp;gt;&lt;br /&gt;
Web: http://goo.gl/Y5d2y&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Chapter Board Responsibilities ===&lt;br /&gt;
&lt;br /&gt;
* '''Board Member''' Three (3) - OWASP NoVA Chapter Board Members will be verified OWASP members, in good standing, dedicated to direction and governance of the chapter. Responsibilities will include:&lt;br /&gt;
&lt;br /&gt;
* Providing governance for chapter and member activities in terms chapter mission and OWASP code of ethics &lt;br /&gt;
* Recruiting OWASP membership&lt;br /&gt;
* Driving OWASP NoVA Chapter attendance and involvement&lt;br /&gt;
* Deferring to, facilitating, and supporting the activities and projects of chapter membership&lt;br /&gt;
* Eliciting, scheduling, and coordinating chapter panels, speakers, and other sessions&lt;br /&gt;
* Scouting, clearing, and scheduling chapter meeting venues and catering&lt;br /&gt;
* Identifying opportunities for collaboration between chapter membership, OWASP global committees, and other organizations &lt;br /&gt;
* Collecting and auditing use of chapter funds&lt;br /&gt;
* Voting on chapter matters&lt;br /&gt;
&lt;br /&gt;
* '''Board Chairperson''' (1) - OWASP NoVA Chapter Board Chairperson will be a verified OWASP member, in good standing, dedicated to the direction and governance of the chapter. Responsibilities will include those of a board member. In addition, the chairperson will:&lt;br /&gt;
&lt;br /&gt;
* Defer to, facilitate, and support the activities and projects of the chapter board and its membership&lt;br /&gt;
* Represent chapter in OWASP forums, such as the global summit&lt;br /&gt;
* In conjunction with OWASP NoVA Board Members, set annual chapter mission&lt;br /&gt;
&lt;br /&gt;
Board members should be prepared to:&lt;br /&gt;
&lt;br /&gt;
* Devote approximately 4 hrs every two weeks to chapter business&lt;br /&gt;
* Stand for election every twenty-four (24) months &lt;br /&gt;
* Remain absolutely vendor neutral and&lt;br /&gt;
* Uphold the OWASP principals and code of ethics.&lt;br /&gt;
&lt;br /&gt;
=== Election Procedures ===&lt;br /&gt;
'''Proof of Eligibility'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Candidates wishing to stand for election, will verify their eligibility along with posting their intentions in the section below. Eligibility will be verified through the following means:&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;OL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;List your name&lt;br /&gt;
&amp;lt;LI&amp;gt;List your OWASP member ID (available here: [http://spreadsheets.google.com/a/owasp.org/pub?key=p6IFyntQTi7sxa2Xjx191BA Individual Member Roster]). Individual membership not required for election, but strongly recommended in order to 'lead by example'. Those seeking membership can find more information [http://www.owasp.org/index.php/Membership here]&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Indicate what city and town you live in (We'll only consider local members, but you may live in WV, VA, MD, or DC)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsement from someone else in the chapter&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/OL&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Time table'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will announce their intentions at our next Chapter meeting, April 7, 2011 @ 6pm. Candidates unable to appear in person can announce their intentions through editing the wiki. If you'd like, I can read something on your behalf at the meeting.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Candidates will be asked to give a brief (5 minute) talk discussing their intentions for candidacy.Candidates will also announce the position for which they're running.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;A vote will be conducted during our May chapter meeting&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;The deadline for candidacy will be the meeting's end, April 7th, 2011, @9pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Voting'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The election procedure will be as follows:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be cast at our May 4th, 2011 chapter meeting, promptly @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Chapter participants must be present in person to vote.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Absentee voting will be allowed in the case participants can not be present on the 4th, due to medical, travel, or other reasons. Absentee voters must contact both John Steven and Ben Tomhave with your intention to absentee vote no later than April 29th, 2011 @ 6pm.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Votes will be counted during the May 4th meeting, and an announcement made as to the winner at the meeting's end.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Candidates ===&lt;br /&gt;
&lt;br /&gt;
'''John Steven'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Chairperson&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Sterling, VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: Jeremy Long (68NRW3GS8RN)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Grow chapter membership &amp;amp; participation with a keen focus on technical depth of presentations and material.&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Jack Mannino'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Member ID: (67324580)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Position: Board Member&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Northern VA&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Endorsed by: John Steven (68NSRT2PSVV)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Purpose: Ensure that the chapter remains vendor-neutral, increase collaboration between chapter members, and promote new technical initiatives within our chapter. &amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
==== About  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp-nova.JPG|right|275px|Owasp-nova.JPG]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}} &lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter. &lt;br /&gt;
&lt;br /&gt;
==== Schedule  ====&lt;br /&gt;
&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm &lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171 &lt;br /&gt;
&lt;br /&gt;
'''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
  * News / Updates&lt;br /&gt;
  * 2011 Election&lt;br /&gt;
  * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
  * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
  * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
  * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
  * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]''' &lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]). &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers  ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members. &lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings  ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm '''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171 '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
  * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
  * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt; '''AGENDA:''' &lt;br /&gt;
&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt; '''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt; '''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt; '''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt; '''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt; '''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
=== June 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt; '''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&lt;br /&gt;
A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what? We're doing it wrong. Fundamentally wrong. This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''SPECIAL SPEAKER''':&lt;br /&gt;
&lt;br /&gt;
[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== May 2010  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt; '''TITLE''': State of Software Security ([[Image:State of Software Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== September 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;br&amp;gt; '''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&lt;br /&gt;
&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER''': Jeremy Epstein, SRI&amp;lt;br&amp;gt; '''DESCRIPTION''': &lt;br /&gt;
&lt;br /&gt;
After the 2000 election, many states launched headlong into electronic voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;. Once problems with those systems started appearing, many localities started moving to optical scan, which was used by a majority of US voters in the 2008 election. There are other technologies in use around the country, including lever machines, vote-by-mail, vote-by-phone, and Internet voting. What are the tradeoffs among these technologies? Particularly relevant to OWASP, what are the security issues associated with different types of equipment, and what measures do vendors of voting equipment use to try to address the security problems? Are software security problems important, or can non-technical measures protect against them? In this talk, we'll discuss a wide variety of voting technologies, and their pros and cons from both a technical and societal perspective.&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''': &lt;br /&gt;
&lt;br /&gt;
Jeremy Epstein is Senior Computer Scientist at SRI International. His background includes more than 20 years experience in computer security research, product development, and consulting. Prior to joining SRI International, he was Principal Consultant with Cigital, and before that spent nine years as Senior Director of Product Security at Software AG, an international business software company. Within the area of voting systems, Jeremy has been involved for over five years in voting technology and advocacy, both as an employee and as an independent consultant.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt; '''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt; '''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;br&amp;gt; '''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;br&amp;gt; '''DESCRIPTION''': So what is O2? &lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People) &lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission). &lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review. &lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities&amp;amp;nbsp;:) &lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz)&amp;amp;nbsp;:) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours. &lt;br /&gt;
&lt;br /&gt;
=== June 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;br&amp;gt; Later, an interview: ''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security'' ''&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security] &lt;br /&gt;
&lt;br /&gt;
=== May 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;br&amp;gt; Later, a panel: &lt;br /&gt;
&lt;br /&gt;
*Steven Lavenhar, Booz Allen Hamilton; &lt;br /&gt;
*Eric Dalci, Cigital Inc.&lt;br /&gt;
&lt;br /&gt;
Panel moderated by John Steven &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools. &lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis] &lt;br /&gt;
&lt;br /&gt;
=== April 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt; Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Later, &lt;br /&gt;
&lt;br /&gt;
*Nate Miller, Stratum Security; &lt;br /&gt;
*Jeremiah Grossman, Whitehat Security; &lt;br /&gt;
*Tom Brennan, Whitehat Security; and &lt;br /&gt;
*Wade Woolwine, AOL&lt;br /&gt;
&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk. &lt;br /&gt;
&lt;br /&gt;
=== February 2009  ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity''' &lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth. &lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes. &lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett ) &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip|WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]] &lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists''' &lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip|Moving Beyond Top N Lists]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real. &lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University. &lt;br /&gt;
&lt;br /&gt;
=== January 2009  ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project. &lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI''' &lt;br /&gt;
&lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions. To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices. During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
&lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS''' &lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range of coverage and level of rigor available in the market when it comes to performing application-level security verification. The goal is to create a set of commercially-workable open standards that are tailored to specific web-based technologies. &lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in application security and the use of cryptography by applications. He is experienced in trusted product evaluation, security-related software development and integration, and cryptomodule testing. For OWASP, he is the project lead and a co-author of the OWASP Application Security Verification Standard, the first OWASP standard. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]] &lt;br /&gt;
&lt;br /&gt;
=== November 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing. &lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance''' &lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance Forum efforts to establish a comprehensive framework for software assurance (SwA) and security measurement. The Framework addresses measuring achievement of SwA goals and objectives within the context of individual projects, programs, or enterprises. It targets a variety of audiences including executives, developers, vendors, suppliers, and buyers. The Framework leverages existing measurement methodologies, including Practical Software and System Measurement (PSM); CMMI Goal, Question, Indicator, Measure (GQ(I)M); NIST SP 800-55 Rev1; and ISO/IEC 27004 and identifies commonalities among the methodologies to help organizations integrate SwA measurement in their overall measurement efforts cost-effectively and as seamlessly as possible, rather than establish a standalone SwA measurement effort within an organization. The presentation will provide an update on the SwA Forum Measurement Working Group work, present the current version of the Framework and underlying measures development and implementation processes, and propose example SwA measures applicable to a variety of SwA stakeholders. The presentation will update the group on the latest NIST and ISO standards on information security measurement that are being integrated into the Framework as the standards are being developed. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook''' &lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp;amp; Associates, October 2008) gives developers and testers the tools they need to make security testing a regular part of their development lifecycle. Its recipe style approach covers manual, exploratory testing as well automated techniques that you can make part of your unit tests or regression cycle. The recipes cover the basics like observing messages between clients and servers, to multi-phase tests that script the login and execution of web application features. This book complements many of the security texts in the market that tell you what a vulnerability is, but not how to systematically test it day in and day out. Leverage the recipes in this book to add significant security coverage to your testing without adding significant time and cost to your effort. &lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book. Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]] &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]] &lt;br /&gt;
&lt;br /&gt;
=== October 2008  ===&lt;br /&gt;
&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics. &lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats''' &lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]] &lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data''' &lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities. &lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ] &lt;br /&gt;
&lt;br /&gt;
=== History ===&lt;br /&gt;
&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Groups  ====&lt;br /&gt;
&lt;br /&gt;
Within the chapter, various common interests spring up. We've created Google groups to manage collaboration amongst participants for these topics. Feel free to join and participate in: &lt;br /&gt;
&lt;br /&gt;
*[http://groups.google.com/group/novaowasp_threatmodeling  Threat Modeling] &lt;br /&gt;
*[http://groups.google.com/group/novaowasp_mobile  Mobile] &lt;br /&gt;
&lt;br /&gt;
==== Knowledge  ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as: &lt;br /&gt;
&lt;br /&gt;
*Threat Modeling &lt;br /&gt;
*[[Code Review and Static Analysis with tools]] &lt;br /&gt;
*Penetration Testing and Dynamic Analysis tools &lt;br /&gt;
*Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include: &lt;br /&gt;
&lt;br /&gt;
*ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum  ===&lt;br /&gt;
&lt;br /&gt;
*For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter]. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]] &lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt; Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources  ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;br&amp;gt; [http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;br&amp;gt; Jesse Ou on XML Bombs. Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Virginia]] [[Category:Washington,_DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_7&amp;diff=107004</id>
		<title>Global Education Committee - Application 7</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_7&amp;diff=107004"/>
				<updated>2011-03-16T19:54:23Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Dr. A.L. Gottlieb.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Coordinator/facility host for N. Virginia, OWASP Presenter.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Education Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Benjamin Tomhave&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP NoVA Program Committee, OWASP GCC member (pending final board approval)&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Tony's contributions to OWASP NoVA have been outstanding! He has helped host several chapter meetings, has presented in the past, will be presenting again in April 2011, and is overall a strong supporter of OWASP Education initiatives.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Dan Cornell&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=106539</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=106539"/>
				<updated>2011-03-09T16:14:38Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' April 7, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.reversespace.com/ ReverseSpace], 13505 Dulles Technology Dr, Suite 3, Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Topic of the Month: [http://www.owasp.org/index.php/Top_10_2010-A2 A2 &amp;quot;Cross-Site Scripting (XSS)&amp;quot;]&lt;br /&gt;
   * Preso:&amp;quot;Cross-Site Scripting is Not Your Friend: XSS and the Facebook Platform&amp;quot; by Joey Tyson&lt;br /&gt;
   * Preso:“XSS Remediation” by Cassia Martin&lt;br /&gt;
   * Preso:&amp;quot;Growing the secure application developer community through expanded curricula&amp;quot; by Tony Gottlieb&lt;br /&gt;
   * FireTalks (bring it!)&lt;br /&gt;
&lt;br /&gt;
'''[http://www.regonline.com/owaspnova-april2011 PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== March 2011 ===&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm&lt;br /&gt;
'''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== February 2011 ===&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010 ===&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=106218</id>
		<title>OWASP AppSec DC 2010 Schedule</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2010_Schedule&amp;diff=106218"/>
				<updated>2011-03-03T20:31:29Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
====Training 11/08====&lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 1 - Nov 8th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Art of Exploiting SQL Injections]] &amp;lt;br&amp;gt;Sumit Siddharth, 7Safe Limited&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[WebAppSec.php: Developing Secure Web Applications]]&amp;lt;br&amp;gt;Robert Zakon&lt;br /&gt;
&amp;lt;!-- Training Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Training 11/09==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Training Day 2 - Nov 9th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''149A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''149B''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''154A''' &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''155'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | '''154B'''&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''159B'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-12:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:00-13:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#909090&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 13:00-17:00 &lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Assessing and Exploiting Web Applications with Samurai-WTF]]&amp;lt;br&amp;gt;Justin Searle, InGuardians&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Leading an AppSec Initiative ]]&amp;lt;br&amp;gt;Jeff Williams, Aspect Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | Day 1:&amp;lt;br&amp;gt;[[Remote Testing for Common Web Application Security Threats]]&amp;lt;br&amp;gt;David Rhoades, Maven Security&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Java Security Overview ]]&amp;lt;br&amp;gt;Zoltán Hornák, SEARCH-LAB&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#BCA57A&amp;quot; align=&amp;quot;center&amp;quot; | [[Software Security Remediation: How to Fix Application Vulnerabilities ]]&amp;lt;br&amp;gt;Dan Cornell, Denim Group&lt;br /&gt;
| width=&amp;quot;150&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Threat Modeling Express]]&amp;lt;br&amp;gt;Rohit Sethi &amp;amp; Oliver Ng, Security Compass&lt;br /&gt;
&amp;lt;!-- Training Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 1 - 11/10==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 1 - Nov 10th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''Defense (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''Metrics (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Government (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:50-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Welcome and Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Neal Ziring|Keynote: Neal Ziring]]&amp;lt;br&amp;gt;National Security Agency&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820731 Video] | [[Media: OWASP-appsec2010-app_assurance-nziring-20101110.ppt | Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | OWASP Status Update&amp;lt;br&amp;gt;[[OWASP:About#Global_Board_Members| OWASP Board]]&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18821089 Video] | [http://www.owasp.org/images/0/0f/OWASPDC2010-v1.pdf Slides]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:30-10:45 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Redspin30x120.png|link=http://www.redspin.com]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:45-11:30 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Python Basics for Web App Pentesters]]&amp;lt;br&amp;gt;Justin Searle &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19346235 Video] | [[Media: Python_Basics_for_Web_App_Pentesters.zip|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Drive By Downloads: How To Avoid Getting A Cap Popped In Your App]]&amp;lt;br&amp;gt;Neil Daswani&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Dasient_11_10_10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Secure Code Review: Enterprise Metrics]]&amp;lt;br&amp;gt;Richard Tychansky&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:OWASP_-_Secure_Code_Review_Enterprise_Metrics.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise]]&amp;lt;br&amp;gt;Joe Jarzombek &amp;amp; Tom Millar&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18802696 Video] | [[Media:SwA_SCRM_10Nov2010_jj.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:30-11:35 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:35-12:20 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[White and Black box testing of Lotus Domino Applications]]&amp;lt;br&amp;gt;Ari Elias-bachrach and Casey Pike&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19344945 Video] | [[Media: Domino_testing_presentation.ppt‎ | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Protecting Federal Government from Web 2.0 Application Security Risks]]&amp;lt;br&amp;gt;Sarbari Gupta&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Protecting_Federal_Government_from_Web_2.0_Application_Security_Risks_-_Sarbari_Gupta_FINAL.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Measuring Security: 5 KPIs for Successful Web App Security Programs]]&amp;lt;br&amp;gt;Rafal Los&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820054 Video] | [[Media:Magic_Numbers_-_5_KPIs_for_Measuring_WebAppSec_Program_Success_v3.2.pdf | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Security Risk and the Software Supply Chain]]&amp;lt;br&amp;gt;Karen Goertzel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:BoozAllen-AppSecDC2010-sw_scrm.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:20-1:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:20-2:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Pen Testing with Iron]]&amp;lt;br&amp;gt;Andrew Wilson &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:PenTestingWithIron.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Providing application-level assurance through DNSSEC]]&amp;lt;br&amp;gt;Suresh Krishnaswamy, Wes Hardaker and Russ Mundy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Providing-Application-level-Assurance-through-DNSSEC-final.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[H.....t.....t....p.......p....o....s....t]]&amp;lt;br&amp;gt;Onn Chee &amp;amp; Tom Brennan &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18818757 Video] | [http://www.owasp.org/images/4/43/Layer_7_DDOS.pdf Slides]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Understanding How They Attack Your Weaknesses: CAPEC]]&amp;lt;br&amp;gt;Sean Barnum&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Making Security Measurable&amp;lt;br&amp;gt;Video | [[Media:Making_Security_Measurable_-_CWE_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Understanding How They Attack Your Weaknesses&amp;lt;br&amp;gt;Video | [[Media:Understanding_How_They_Attack_Your_Weaknesses-CAPEC_-_OWASP_AppSec_DC_2010_(Barnum).pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:05-2:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; | Break&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:10-2:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking Oracle From Web Apps]]&amp;lt;br&amp;gt;Sumit Siddharth&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19357262 Video] | [[Media: Hacking_Oracle_From_Web_Apps_2.0.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[GuardRails: A Nearly Painless Solution to Insecure Web Applications|GuardRails: A (Nearly) Painless Solution to Insecure Web Applications]]&amp;lt;br&amp;gt;Jonathan Burket, Patrick Mutchler, Michael Weaver and Muzzammil Zaveri&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19355417 Video] | [[Media:Guardrails_owasp_final.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Framed! Security-patching Common Web Development Frameworks]] - Panel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18808494 Video]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 2:55-3:10 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:SecureIdeas_30X65.png|link=http://www.secureideas.net]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:10-3:55 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[wXf: Web Exploitation Framework]]&amp;lt;br&amp;gt;Ken Johnson and Chris Gates&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104630 Video] | [[Media: WXf_ASDC_Presentation.odp.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[The Strengths of Combining Code Review with Application Penetration Testing]]&amp;lt;br&amp;gt;Dave Wichers&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19104928 Video] | [[Media: 2010-DC_The_Power_of_Code_Review.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Dealing with Web Application Security, Regulation Style]]&amp;lt;br&amp;gt;Andrew Weidenhamer&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Andrew_Weidenhamer_AppSecDC_Presentation.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Ensuring Software Assurance Process Maturity]]&amp;lt;br&amp;gt;Edmund Wotring&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:20101110_-_Ensuring_Software_Assurance_Process_Maturity_-_Final.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 3:55-4:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:00-4:45 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;5&amp;quot; | [[Pen-Test Panel]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Botnet Resistant Coding: Protecting Your Users from Script Kiddies]]&amp;lt;br&amp;gt;Fabian Rothschild and Peter Greko&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Bot_res_enc.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;1&amp;quot; | [[OWASP Broken Web Applications Project Update]]&amp;lt;br&amp;gt;Chuck Willis&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19331937 Video] | [[Media:Chuck_Willis_OWASPBWA_for_OWASP_AppSecDC_2010-11-10.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group]]&amp;lt;br&amp;gt;Michele Moss&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105480 Video] | [[Media: OWASP_DC_2010_Moss_fin.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation]]&amp;lt;br&amp;gt;Joshua Windsor and Joshua Pauli&amp;lt;br&amp;gt;Video | [[Media: Smashing_WebGoat_-_AppSecDC_Presentation.odp.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:45-4:50 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;2&amp;quot;| 4:50-5:35 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners]]&amp;lt;br&amp;gt;David Shelly, Randy Marchany &amp;amp; Joseph Tront&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984178 Video] | [[Media:Closing_the_Gap_AppSecDC_Shelly.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Using Misuse Cases to Articulate Vulnerabilities to Stakeholders]]&amp;lt;br&amp;gt;Scott Mendenhall&amp;lt;br&amp;gt;Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;2&amp;quot; | [[Federal Perspectives on Application Security]] - Panel&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;90&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Web Hacking Incident Database (WHID) Report]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19337407 Video] | [[Media:AppSecDC_2010-WHID_Report-Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:30-7:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Cocktails sponsored by [[Image:Trustwave50x250.png|link=https://www.trustwave.com/‎‎]]&lt;br /&gt;
&amp;lt;!-- Day 1 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
====Plenary Day 2 - 11/11==== &lt;br /&gt;
{| cellspacing=&amp;quot;0&amp;quot; border=&amp;quot;2&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;middle&amp;quot;&lt;br /&gt;
| height=&amp;quot;60&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;5&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font size=&amp;quot;5&amp;quot;&amp;gt;'''Plenary Day 2 - Nov 11th 2010'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | &amp;amp;nbsp; &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | '''Offense (147B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | '''New Frontiers (147A)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP (145B)''' &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | '''Process (145A)'''&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 07:30-08:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Registration&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 08:55-09:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Day 2 Opening Remarks&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 09:00-10:00 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | [[AppSec DC 2010 Keynote Ron Ross|Keynote: Ron Ross]]&amp;lt;br&amp;gt;National Institute of Standards and Technology&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18826138 Video] | [[Media: OWASP-11-11-2010-Ross.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:00-10:15 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:Trustwave30x150.png|link=https://www.trustwave.com/‎‎]] &lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 10:15-11:00 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking SAP BusinessObjects]]&amp;lt;br&amp;gt;Joshua Abraham and Will Vandevanter&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Cloudy with a chance of hack!]]&amp;lt;br&amp;gt;Lars Ewe&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:OWASP_Cloudy_with_a_chance_of_hack_Nov_2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Don't Judge a Website by its Icon - Read the Label!|Don’t Judge a Website by its Icon – Read the Label!]]&amp;lt;br&amp;gt;Jeff Williams&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Video | [[Media:2010-11_OWASP_Software_Labels.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18980995 Video] | [[Media: ApplicationPortfolioRiskRanking_BanishingFUDWithStructureAndNumbers_Content.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:00-11:05 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:05-11:50 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Deconstructing ColdFusion ]]&amp;lt;br&amp;gt;Chris Eng and Brandon Creighton&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: OWASP_AppSec_DC_2010_-_Deconstructing_ColdFusion.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Declarative Web Security]]&amp;lt;br&amp;gt;Brandon Sterne&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/18984410 Video] | [[Media: Mozilla_OWASP_AppSec_2010_DC.pdf‎|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[The Secure Coding Practices Quick Reference Guide]]&amp;lt;br&amp;gt;Keith Turpin&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105173 Video] | [[Media: Secure_Coding_Practices_Quick_Ref_4.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Code Reviewing Strategies]]&amp;lt;br&amp;gt;Andrew Wilson and John Hoopes&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:CodeReviewStrategies.pptx|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 11:50-11:55 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 11:55-12:40 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Friendly Traitor 2 Features are hot but giving up our secrets is not!]]&amp;lt;br&amp;gt;Kevin Johnson and Mike Poor&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18810353 Video] | [[Media: Friendly_Traitor_2.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files]]&amp;lt;br&amp;gt;Aleksandr Yampolskiy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Exploiting_Media_For_Fun_and_Profit.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Open Source Web Entry Firewall]]&amp;lt;br&amp;gt;Ivan Buetler&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: AppSecDC_Open_Source_Web_Entry_Server_V2.2.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Microsoft's Security Development Lifecycle for Agile Development]]&amp;lt;br&amp;gt;Nick Coblentz&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19105707 Video] | [[Media:OWASP_AppSec_DC_2010_-_Microsoft_SDL-Agile_Presentation_-_Nick_Coblentz_2010-11-11.pdf|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 12:40-1:40 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;40&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Lunch&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 1:40-2:25 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Hacking .NET Applications at Runtime: A Dynamic Attack]]&amp;lt;br&amp;gt;Jon McCoy&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18984620 Video] | [[Media: AppSecDC_-_Attacking_.NET_Applications_at_Runtime.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Life in the Clouds: a Service Provider's View]]&amp;lt;br&amp;gt;Michael Smith&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18820461 Video] | [[Media: Life_In_the_Clouds.Smith.AppSecDC2010.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Solving Real World Problems with ESAPI]]&amp;lt;br&amp;gt;Chris Schmidt&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:ESAPI-2010-AppSecDC.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; rowspan=&amp;quot;3&amp;quot;| [[Financial Services Panel]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:25-2:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 2:30-3:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[JavaSnoop: How to hack anything written in Java]]&amp;lt;br&amp;gt;Arshan Dabirsiaghi&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/19051012 Video] | [[Media:JavaSnoop_-_OWASP_AppSec_DC_2010.pptx|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Social Zombies Gone Wild: Totally Exposed and Uncensored]]&amp;lt;br&amp;gt;Kevin Johnson and Tom Eston&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;[http://vimeo.com/groups/asdc10/videos/18827316 Video] | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[Attack Detection and Prevention with OWASP AppSensor]]&amp;lt;br&amp;gt;Colin Watson&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC-colin-watson-appsensor.ppt|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:15-3:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;30&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Coffee Break sponsored by [[Image:AppSecDC-2010-Syngress75x30.gif‎‎|link=http://www.syngress.com/]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 3:30-4:15 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Unlocking the Toolkit: Attacking Google Web Toolkit]]&amp;lt;br&amp;gt;Ron Gutierrez&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Attacking_Google_Web_Toolkit.ppt | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications]]&amp;lt;br&amp;gt;Dan Cornell&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: SmartPhonesDumbApps_OWASPDC_20101111_Content.pdf|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ModSecurity Core Rule Set]]&amp;lt;br&amp;gt;Ryan Barnett&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:AppSecDC_2010-ModSecurityCRS_Ryan_Barnett.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[Implementing a Secure Software Development Program]]&amp;lt;br&amp;gt;Darren Death&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; rowspan=&amp;quot;1&amp;quot;| 4:15-4:20 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;5&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Break&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 4:20-5:05 &lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#c0a0a0&amp;quot; align=&amp;quot;center&amp;quot; | [[Constricting the Web: Offensive Python for Web Hackers]]&amp;lt;br&amp;gt;Marcin Wielgoszewski and Nathan Hamiel&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | Slides&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#ffdf80&amp;quot; align=&amp;quot;center&amp;quot; | [[Threats from Economical Improvement]]&amp;lt;br&amp;gt;Eduardo Neves&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media: Threats_from_Economical_Improvement_OWASP_AppSec_2010_LR.key.zip | Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#a0c0e0&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP ESAPI SwingSet]]&amp;lt;br&amp;gt;Fabio Cerullo&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Video | [[Media:Esapi_swingset_talk_dc.ppt|Slides]]&lt;br /&gt;
| width=&amp;quot;200&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;120&amp;quot; bgcolor=&amp;quot;#b3ff99&amp;quot; align=&amp;quot;center&amp;quot; | [[The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform]]&amp;lt;br&amp;gt;Benjamin Tomhave&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://vimeo.com/groups/asdc10/videos/19908922 Video] | [[Media: Carrot-stick-consequences-AppSecDC-2010.key.zip|Slides]]&lt;br /&gt;
|- valign=&amp;quot;bottom&amp;quot;&lt;br /&gt;
| width=&amp;quot;72&amp;quot; valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#7b8abd&amp;quot; | 5:05-5:30 &lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; height=&amp;quot;60&amp;quot; bgcolor=&amp;quot;#e0e0e0&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; | Closing Remarks/Prizes&amp;lt;br&amp;gt;The OWASP AppSec DC Team&amp;lt;!-- Day 2 --&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[OWASP AppSec DC 2010|Main Conference Page]] | [[:Category:AppSec DC 2010 Presentations|Presentations Page]] | [[:Category:AppSec DC 2010 Training|Training Page]]&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_AppSec_Conference]] [[Category:OWASP_AppSec_DC_2010]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=105569</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=105569"/>
				<updated>2011-02-22T22:16:26Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova030311.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:benjamin.tomhave@owasp.org Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== February 2011 ===&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010 ===&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_9&amp;diff=105565</id>
		<title>Global Conferences Committee - Application 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_9&amp;diff=105565"/>
				<updated>2011-02-22T20:42:13Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Benjamin (Ben) Tomhave&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP NoVA Program Committee member, OWASP Summit 2011 attendee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=105564</id>
		<title>How to Join a Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=105564"/>
				<updated>2011-02-22T20:40:32Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Global Committee Pages|Click here to return to the Global Committee Pages]]. &lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Many individuals start with OWASP as a user of a tool/guide or attending a local chapter. From that they may become a individual project leader on a new tool/guide or may serve on the board of a local OWASP chapter. Becoming a member of one of the Global Committees is not only a great achievement in the technical community, but is an opportunity to directly impact the future of OWASP Foundation. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Global Committees are designed to develop a committee plan and then work on a global effort with your peers from around the world. Ideally you nominate a peer as a regional spokesperson and he/she is the conduit for global issues that has approx., 10 hrs per month to volunteer time to OWASP Foundation. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; To encourage focus and participation, we suggest that volunteers contribute to '''ONE COMMITTEE''' only.  Individuals are welcome to participate in whatever committee they prefer, but may only be officially elected to serve on one committee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; This NEW ROLE was announced at the OWASP Portugal Summit and several individuals were nominated from the floor of the event and a motion was approved at the public board meeting in November 2008. There is still time.... If you were not at the event and would like to get involved with a global role and are either a project leader or chapter leader and it must be supported by 5 endorsements of you regional peers*. We are calling this the &amp;quot;2009 2nd wave applicants&amp;quot; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Note that to prevent conflict of interest, Board members cannot endorse candidates for any committee nor can a committee member endorse a candidate for their own committee. Committee members may endorse candidates for other committees to which they do not belong.&lt;br /&gt;
* Committee members who wish to transfer between committees, should discuss this with their current committee first.  They must begin a new application for the committee they want to move to.&lt;br /&gt;
&lt;br /&gt;
Still have questions - [https://spreadsheets.google.com/a/owasp.org/viewform?hl=en&amp;amp;formkey=dFN1R2NIMTNROXN3dml4ZEcxXzJQYXc6MQ#gid=0 Contact Us]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Fill in one of the below application forms. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Current Committee MEMBERS UNDER ELECTION - APPLICATION FORMS  ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width: 90%&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;background: rgb(64,88,160); color: white; -moz-background-inline-policy: continuous&amp;quot; colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; | '''OWASP GLOBAL COMMITTEES - UNDER ELECTION'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Projects''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Membership''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Education''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Conferences''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Industry''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Chapters''' &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(242,152,76); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[OWASP_Connections_Committee | Connections]]'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''Applications -&amp;amp;gt;''' &lt;br /&gt;
| style=&amp;quot;width: 15%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Projects and Tools Committee - Application 1|Aryavalli Gandhi]]'''&amp;lt;br&amp;gt;'''[[Global Projects and Tools Committee - Application 2|Brad Causey]]'''&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 5|Application 5]]&amp;lt;br&amp;gt;add [[Global Projects and Tools Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee - Application 1|Tony UcedaVelez]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 2|Mateo Martínez]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 3|Ofer Maor]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 4|Aryavalli Gandhi]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 5|Helen Gao]]&amp;lt;br&amp;gt;add [[Global Membership - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Education Committee - Application 2|'''Carlos Serrão''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 3|'''Sébastien Gioria''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 5|Marc Chisinevski]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 6|Zaki Akhmad]]&amp;lt;br&amp;gt; add [[Global Education Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 7|'''Mohd Fazli Azran''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 8|'''Applicant 8''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 9|'''Benjamin (Ben) Tomhave''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 10|'''Applicant 10''']]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;add [[Global Conferences Committee - Template|more]], if needed&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Industry Committee - Application 1|'''Colin Watson''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 2|'''Alexander Fry''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 3|'''Yiannis Pavlosoglou''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 4|'''Joe Bernik''']]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 5|'''Lorna Alamri''']]&amp;lt;br&amp;gt; [[Global Industry Committee - Application 6|Nishi Kumar]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 7|Applicant 7]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 8|Applicant 8]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 9|Applicant 9]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 10|Applicant 10]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 11|Applicant 11]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 12|Applicant 12]] &amp;lt;br&amp;gt;[[Global Industry Committee - Application 13|Michael Scovetta]] &amp;lt;br&amp;gt;add [[Global Industry Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Chapter Committee - Application 2|Matthew Chalmers]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 3|Mandeep Khera]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 4|Tin Zaw.]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 5|L. Gustavo C. Barbato]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 6|Ofer Maor]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 7|Gandhi Aryavalli]]&amp;lt;br&amp;gt;add [[Global Chpaters Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width: 14%; background: rgb(204,204,204); -moz-background-inline-policy: continuous&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''[[OWASP Connections Committee - Application 1|Lorna Alamri]]'''&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 2|'''Robert Hansen''']]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 3|'''Justin Clarke''']]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 4|'''Jim Manico''']]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 5|Greg Genung]]&amp;lt;br&amp;gt;[[OWASP Connections Committee - Application 6|Doug Wilson]]&amp;lt;br&amp;gt;add [[OWASP Connections Committee - Template|more]], if needed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== MEMBERS WITH OWASP SUMMIT'S APPROVAL  ===&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 90%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); -moz-background-inline-policy: continuous; color: white;&amp;quot; | '''OWASP GLOBAL COMMITTEES - ELECTED AT THE OWASP SUMMIT 08'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Projects Committee|'''Projects''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Membership Committee|'''Membership''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Education Committee|'''Education''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Conferences Committee|'''Conferences''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Industry Committee|'''Industry''']] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(242, 152, 76); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | [[Global Chapter Committee|'''Chapters''']]&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | Current committee members &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 15%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Dinis.cruz|Dinis Cruz]] &lt;br /&gt;
*[[:Image:Image021-Jason Li.jpg|Jason Li]] &lt;br /&gt;
*[[:Image:Image019-Matt Tesauro.jpg|Matt Tesauro]] &lt;br /&gt;
*[[:Image:Image022-Leo Cavallari.jpg|Leo Cavallari]] &lt;br /&gt;
*[[:Image:Image020-Pravir Chandra.jpg|Pravir Chandra]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image018-Dan Cornell.jpg|Dan Cornell]] &lt;br /&gt;
*[[:Image:Image017-Michael Coates.jpg|Michael Coates]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image007-Martin Knobloch.jpg|Martin Knobloch]] &lt;br /&gt;
*[[:Image:Image012-Mano Paul.jpg|Mano Paul]] &lt;br /&gt;
*[[:Image:Image008-Eduardo Neves.jpg|Eduardo Neves]] &lt;br /&gt;
*[[:Image:Image010-Kuai Hinjosa.jpg|Kuai Hinjosa]] &lt;br /&gt;
*[[:Image:Image011-Cecil Su.jpg|Cecil Su]] &lt;br /&gt;
*[[:Image:Image009-Fabio Cerullo.jpg|Fabio Cerullo]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Wichers|Dave Wichers]] &lt;br /&gt;
*[[:Image:Image005-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
*[[:Image:Image003-Steve Antoniewicz.jpg|Steve Antoniewicz]] &lt;br /&gt;
*[[:Image:Image004-Dhruv Soi.jpg|Dhruv Soi]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[:User:Brennan|Tom Brennan]] &lt;br /&gt;
*[[:Image:Image014 Rex Booth.jpg|Rex Booth]] &lt;br /&gt;
*[[:Image:Image016-Georg Hess.jpg|Georg Hess]] &lt;br /&gt;
*[[:Image:Image013-Eoin Keary.jpg|Eoin Keary]] &lt;br /&gt;
*[[:Image:Image015-David Campbell.jpg|David Campbell]]&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(204, 204, 204); width: 14%; -moz-background-inline-policy: continuous;&amp;quot; | &lt;br /&gt;
*[[User:Sdeleersnyder|Seba Deleersnyder]] &lt;br /&gt;
*[[:Image:Image002-Puneet Mehta.jpg|Puneet Mehta]] &lt;br /&gt;
*[[:Image:Image001-Wayne Huang.jpg|Wayne Huang]]&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_9&amp;diff=105563</id>
		<title>Global Conferences Committee - Application 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_9&amp;diff=105563"/>
				<updated>2011-02-22T20:31:00Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Benjamin (Ben) Tomhave&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP NoVA Program Committee, OWASP Summit 2011&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=105530</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=105530"/>
				<updated>2011-02-21T15:43:10Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' March 3, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.boozallen.com/ Booz Allen Hamilton], 13200 Woodland Park Road, Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011] In Review&lt;br /&gt;
   * Preso: [http://www.owasp.org/index.php/Top_10_2010-A1-Injection A1 &amp;quot;Injection&amp;quot;]&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova030311.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== February 2011 ===&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
=== December 2010 ===&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=102236</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=102236"/>
				<updated>2011-01-26T19:35:47Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova020311.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 (+2) list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== December 2010 ===&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=101336</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=101336"/>
				<updated>2011-01-21T21:40:47Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' February 3, 2011 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://www.akamai.com/ Akamai], 11111 Sunset HIlls Dr, Suite 250, Reston, VA 20190&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * News / Updates&lt;br /&gt;
   * Feedback for [http://www.owasp.org/index.php/OWASP_Summit_2011 OWASP Summit 2011]&lt;br /&gt;
   * Preso: Intro to [http://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project OWASP Top 10] + 2&lt;br /&gt;
   * Briefing: Training/Preso Plan for the Year&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova020311.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
'''NEWS:''' We will be spending the next few months doing a deep-dive into the OWASP Top 10 (+2) list. You will learn from these sessions what the problem is, how it's exploited, and how to mitigate the weakness. We anticipate this being at least 5 months of sessions. We will also potentially supplement &lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== December 2010 ===&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=94351</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=94351"/>
				<updated>2010-11-29T19:36:57Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking (BYOB!)&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova122010.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92444</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92444"/>
				<updated>2010-11-05T21:42:16Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking&lt;br /&gt;
&lt;br /&gt;
'''[http://owaspnova122010.eventbrite.com/ PLEASE RSVP]'''&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92443</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92443"/>
				<updated>2010-11-05T20:48:56Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' December 2, 2010 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' [http://hackerspaces.org/wiki/Reverse_Space ReverseSpace], 13505 Dulles Technology Drive, Herndon, VA&lt;br /&gt;
&lt;br /&gt;
'''AGENDA:'''&lt;br /&gt;
   * 2011 Planning Session (Schedule, Volunteers, Speakers, Topics)&lt;br /&gt;
   * Lightning Talks!! (Bring an idea, a question, a topic, whatever - 5-10 minute talks max!)&lt;br /&gt;
   * Social / Networking&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== November 2010 ===&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&amp;lt;br&amp;gt;&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker:''' Ben Tomhave&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&amp;lt;br&amp;gt;&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92040</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92040"/>
				<updated>2010-10-27T19:16:19Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Date/Time:''' November 4, 2010 @ 6pm&lt;br /&gt;
&lt;br /&gt;
'''Location Sponsor:''' Akamai, 11111 Sunset Hills Rd, Suite #250, Reston, VA&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&lt;br /&gt;
&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
'''Notes:''' This is the first-run for a presentation that will also be delivered at AppSecDC 2010 and Security B-Sides Ottawa 2010.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
We are in the process of booking sessions for the rest of the year, including the following speakers:&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* Steve Lipner&lt;br /&gt;
* Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
We also plan to have a social event sometime in August or September, as well as a chapter meeting dedicated to flash/lightning talks. Please stay tuned!&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92031</id>
		<title>Virginia</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Virginia&amp;diff=92031"/>
				<updated>2010-10-27T17:21:19Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== About ====&lt;br /&gt;
[[Image:Owasp-nova.JPG|275px|right]]The '''OWASP Northern VA Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations of specific OWASP projects and research topics and sharing SDLC knowledge. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations to utilize the OWASP  Powerpoint template when applicable and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association donations of meeting space or refreshments sponsorship is encouraged, simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP please review the Chapter Rules.&lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in app-sec, to those experienced and accomplished professionals who are looking for competent collaborators for OWASP-related projects. To this end, we will continue to conduct both monthly chapter meetings as well as out-of-band curricula, on application security topics. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Virginia|extra=The chapter leader is [mailto:John.Steven@owasp.org John Steven].&lt;br /&gt;
&lt;br /&gt;
=== Program Committee ===&lt;br /&gt;
The OWASP NoVA Chapter Program Committee aims to:&lt;br /&gt;
&lt;br /&gt;
Actively shepherd speakers and and speaking process within the NoVA chapter in order to assure that chapter meetings provide maximum practical benefit to our constituency. &lt;br /&gt;
&lt;br /&gt;
Benefit the broader OWASP community by creating and supporting a 'preferred speaker' list through explicitly gauging, documenting, and sharing speaker quality data gained through feedback from chapter participants.&lt;br /&gt;
&lt;br /&gt;
In pursuit of this charter, we will elect as many as five program committee members that will, over the course of 2010:&lt;br /&gt;
&lt;br /&gt;
* Create easy-to-apply vetting criteria from existing OWASP chapter guidance and ethics rules.&lt;br /&gt;
* Assure one program committee personnel applies vetting criteria to each-and-every proposed chapter speaker/material&lt;br /&gt;
* Design, document, and implement a chapter participant &amp;quot;speaker survey&amp;quot; / voting mechanism&lt;br /&gt;
* Implement a &amp;quot;speaker survey&amp;quot; results display on the OWASP Wiki for the broader OWASP community to consume&lt;br /&gt;
*  Coordinate with other chapters to set up a 'preferred speaker' list that aggregates data about high-scoring speakers (for the OWASP on-the-move project)&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-wash_dc_va|emailarchives=http://lists.owasp.org/pipermail/owasp-wash_dc_va}}&lt;br /&gt;
&lt;br /&gt;
You may also want to follow [http://twitter.com/OWASPNoVA/ @OWASPNoVA] on Twitter.&lt;br /&gt;
&lt;br /&gt;
===History===&lt;br /&gt;
The original DC Chapter was founded in June 2004 by [mailto:jeff.williams@owasp.org Jeff Williams] and has had members from Virginia to Delaware. In April 2005 a new chapter, OWASP Washington VA Local Chapter, was formed and the DC Chapter was renamed to DC-Maryland. The two are sister chapters and include common members and shared discourse. The chapters meet in opposite halves of the month to facilitate this relationship.&lt;br /&gt;
&lt;br /&gt;
==== Locations ====&lt;br /&gt;
'''If you plan to attend in person:'''&lt;br /&gt;
&lt;br /&gt;
Directions to Booz Allen's One Dulles facility:&lt;br /&gt;
&lt;br /&gt;
13200 Woodland Park Road&lt;br /&gt;
Herndon, VA 20171&lt;br /&gt;
&lt;br /&gt;
From Tyson's Corner:&lt;br /&gt;
&lt;br /&gt;
* Take LEESBURG PIKE / VA-7 WEST&lt;br /&gt;
* Merge onto VA-267 WEST / DULLES TOLL ROAD (Portions Toll)&lt;br /&gt;
* Take the VA-657 Exit (Exit Number 10 towards Herndon / Chantilly)&lt;br /&gt;
* Take the ramp toward CHANTILLY&lt;br /&gt;
* Turn Left onto CENTERVILLE ROAD (at end of ramp)&lt;br /&gt;
* Turn Left onto WOODLAND PARK ROAD (less than 1⁄2 mile)&lt;br /&gt;
* End at 13200 WOODLAND PARK ROAD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Schedule ====&lt;br /&gt;
Meetings are (generally) held the first Thursday of the month.&lt;br /&gt;
&lt;br /&gt;
=== Next Meeting  ===&lt;br /&gt;
&lt;br /&gt;
'''Tentatively: November 4, 2010''' - Evening Timeframe (6pm?) - Location TBD!&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Ben Tomhave&lt;br /&gt;
&lt;br /&gt;
'''Title:''' The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform&lt;br /&gt;
&lt;br /&gt;
'''Description:''' What we're doing today is not working and isn't sustainable. The fundamental culture of the average business does not encourage making good security decisions. Software shops continue to focus on functionality and timelines, neglecting information security. In spite of regulations like PCI and HIPAA+HITECH, which are levying fines against organizations for their security failures, the tipping point has clearly not been reached to cause meaningful change. Much of this problem can be attributed to the excessive use of negative incentives (sticks) instead of providing positive incentives (carrots) that inspire better decision making and motivate true change. Fortunately, it's not too late to change tactics and start achieving demonstrable success.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Ben Tomhave is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP.&lt;br /&gt;
&lt;br /&gt;
'''Notes:''' This is the first-run for a presentation that will also be delivered at AppSecDC 2010 and Security B-Sides Ottawa 2010.&lt;br /&gt;
&lt;br /&gt;
Please check back for updates, join the mailing list, or follow us on Twitter ([http://twitter.com/OWASPNoVA/ @OWASPNoVA]).&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Speakers ===&lt;br /&gt;
&lt;br /&gt;
If you want to present, please contact [mailto:John.Steven@owasp.org John] or [mailto:tomhave@secureconsulting.net Ben]. We're very open to hearing from all our members.&lt;br /&gt;
&lt;br /&gt;
We are in the process of booking sessions for the rest of the year, including the following speakers:&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* Steve Lipner&lt;br /&gt;
* Ken van Wyk&lt;br /&gt;
&lt;br /&gt;
We also plan to have a social event sometime in August or September, as well as a chapter meeting dedicated to flash/lightning talks. Please stay tuned!&lt;br /&gt;
&lt;br /&gt;
[http://www.google.com/calendar/hosted/owasp.org/embed?src=owasp.org_1ht5oegk8kd0dtat5cko71e7dc%40group.calendar.google.com&amp;amp;ctz=America/New_York View the OWASP NoVA Chapter Calendar]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Past meetings ====&lt;br /&gt;
&lt;br /&gt;
=== June 2010 ===&lt;br /&gt;
'''DATE''': Thursday, June 3rd, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER''': Alex Hutton, Verizon Business and http://www.newschoolsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
'''TOPIC''': Risk Management - Time to blow it up and start over?&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''': &amp;lt;p&amp;gt;A redux of the presentation that Alex delivered at B-Sides San Francisco during RSA 2010. &amp;quot;Now that the industry is trying to formalize the concept of risk management into neat little compartments like standards (ISO 27005/31000), certifications (CRISC) and products (GRC) guess what?  We're doing it wrong.  Fundamentally wrong.  This talk will discuss why all this current risk management stuff is goofy and what sort of alternatives we have that might help us understand our ability to protect, our tendency towards failure, and how to match that up with what management will stomach.&amp;quot;&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;Slides are available from: http://www.slideshare.net/BSides/risk-management-time-to-blow-it-up-and-start-over-alex-hutton&amp;lt;/p&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''SPECIAL SPEAKER''': &amp;lt;p&amp;gt;[http://twitter.com/tiffanyrad Tiffany Rad] provided an overview and update on [http://twitter.com/reversespace Reverse Space] in Herndon, VA. For more information, or to help out, please join the [http://groups.google.com/group/ReverseSpace Reverse Space Google Group].&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== May 2010 ===&lt;br /&gt;
'''DATE''': Tuesday, May 18th, 6pm Eastern Daylight Time&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': Booz Allen Hamilton - 13200 Woodland Park Road Herndon, VA 20171&amp;lt;br&amp;gt;&lt;br /&gt;
'''SPEAKER'''': Jeff Ennis, Senior Solutions Architect, Veracode&amp;lt;br&amp;gt;&lt;br /&gt;
'''TITLE''': State of Software Security ([[File:State_of_Software_Security-Ennis.ppsx.zip]])&amp;lt;br&amp;gt; &lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;p&amp;gt;A discussion of the current state of software security based on the compiled findings by Veracode from the dynamic and static code analysis they have performed for customers.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== September 2009 ===&lt;br /&gt;
'''DATE''': Thursday, September 17, 2009. 6:00pm Eastern Daylight Time&amp;lt;BR/&amp;gt;&lt;br /&gt;
'''LOCATION''': 22260 Pacific blvd, Sterling, VA. 20166&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Fortify 360&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Erik Klein (Fortify Software), Eric Dalci (Cigital)&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
 &amp;lt;p&amp;gt; We're pleased to invite you to our next week's OWASP Session (Thursday September 17th). We will be hosting a presentation, demo and hands on session of Fortify 360 (http://www.fortify.com). Fortify 360 includes Fortify SCA (Source Code Analyzer) and the Fortify 360 Server which is Fortify's solution for an enterprise deployment of SCA. The session will start with a presentation by Fortify engineers, followed by a demo and finally a hands on session where the audience will be free to install Fortify SCA on the machine and try it the SCA tool on a sample application that we will provide. The audience will also be introduced with the Fortify 360 Server and try some of the enterprise level features such as collaborative code review, metrics and so on. Bring your laptop if you want to try Fortify 360!&amp;lt;/p&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
The target audience is anyone interested in Secure Code Review with a Static Analysis tool at the desktop level and/or enterprise level. We will need to register visitors before hand...please email wade.woolwine@owasp.org for registration and confirm attendance. Pizza and refreshments will be served.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''DATE''': Thursday, September 3, 2009. 6:00pm.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Conducting Application Assessment&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER''': Jeremy Epstein, SRI&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''':&lt;br /&gt;
&amp;lt;P&amp;gt;After the 2000 election, many states launched headlong into electronic&lt;br /&gt;
voting systems to avoid the problems with &amp;quot;hanging chads&amp;quot;.  Once&lt;br /&gt;
problems with those systems started appearing, many localities started&lt;br /&gt;
moving to optical scan, which was used by a majority of US voters in&lt;br /&gt;
the 2008 election.  There are other technologies in use around the&lt;br /&gt;
country, including lever machines, vote-by-mail, vote-by-phone, and&lt;br /&gt;
Internet voting.  What are the tradeoffs among these technologies?&lt;br /&gt;
Particularly relevant to OWASP, what are the security issues&lt;br /&gt;
associated with different types of equipment, and what measures do&lt;br /&gt;
vendors of voting equipment use to try to address the security&lt;br /&gt;
problems?  Are software security problems important, or can&lt;br /&gt;
non-technical measures protect against them?  In this talk, we'll&lt;br /&gt;
discuss a wide variety of voting technologies, and their pros and cons&lt;br /&gt;
from both a technical and societal perspective.&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''ABOUT THE SPEAKER''':&lt;br /&gt;
&amp;lt;p&amp;gt;Jeremy Epstein is Senior Computer Scientist at SRI International.  His&lt;br /&gt;
background includes more than 20 years experience in computer security&lt;br /&gt;
research, product development, and consulting.  Prior to joining SRI&lt;br /&gt;
International, he was Principal Consultant with Cigital, and before&lt;br /&gt;
that spent nine years as Senior Director of Product Security at&lt;br /&gt;
Software AG, an international business software company. Within the area&lt;br /&gt;
of voting systems, Jeremy has been involved for over&lt;br /&gt;
five years in voting technology and advocacy, both as an employee and&lt;br /&gt;
as an independent consultant.&amp;lt;/p&amp;gt;&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== July 2009 ===&lt;br /&gt;
'''DATE''': July 9th 6pm-9pm EST&amp;lt;br&amp;gt;&lt;br /&gt;
'''LOCATION''': 13200 Woodland Park Road Herndon, VA 20171&amp;lt;BR&amp;gt;&lt;br /&gt;
'''TOPIC''': &amp;quot;Ounce's 02&amp;quot;&amp;lt;BR&amp;gt;&lt;br /&gt;
'''SPEAKER(S)''': Dinis Cruz, OWASP, Ounce Labs.&amp;lt;BR&amp;gt;&lt;br /&gt;
'''DESCRIPTION''': So what is O2?&lt;br /&gt;
&lt;br /&gt;
Well in my mind O2 is a combination of advanced tools (Technology) which are designed to be used on a particular way (Process) by knowledgeable Individuals (People)&lt;br /&gt;
&lt;br /&gt;
Think about it as a Fighter Jet who is able to go very fast, has tons of controls, needs to be piloted by somebody who knows what they are doing and needs to have a purpose (i.e. mission).&lt;br /&gt;
&lt;br /&gt;
Basically what I did with O2 was to automate the workflow that I have when I'm engaged on a source-code security review.&lt;br /&gt;
&lt;br /&gt;
Now, here is the catch, this version is NOT for the faint-of-heart. I designed this to suit my needs, which although are the same as most other security consultants, have its own particularities :)&lt;br /&gt;
&lt;br /&gt;
The whole model of O2 development is based around the concept of automating a security consultant’s brain, so I basically ensure that the main O2 Developer (Dinis Cruz) has a very good understanding of the feature requirements of the targeted Security Consultant (Dinis Cruz) :) . And this proved (even to my surprise) spectacularly productive, since suddenly I (i.e. the security consultant) didn't had to wait months for new features to be added to its toolkit. If there was something that needed to be added, it would just be added in days or hours.&lt;br /&gt;
&lt;br /&gt;
=== June 2009 ===&lt;br /&gt;
''Gary McGraw, Cigital Inc.'':''Building Security In Maturity Model''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, an interview:&lt;br /&gt;
''Jim Routh, formerly of DTCC'':''The Economic Advantages of a Resilient Supply Chain- Software Security&lt;br /&gt;
''&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Gary McGraw talked about the experience he, Sammy Migues, and Brian Chess gained conducting a survey of some of America's top Software Security groups. Study results are available under the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Share Alike license] at [http://www.bsi-mm.com www.bsi-mm.com]. Gary described the common structural elements and activities of successful software security programs, present the maturity model that resulted from survey data, and discuss lessons learned from listening to those leading these groups. &lt;br /&gt;
&lt;br /&gt;
Jim Routh gave an incredibly insightful interview regarding his own experiences crafting their security group. &lt;br /&gt;
&lt;br /&gt;
Download presentation notes at: [http://www.owasp.org/images/0/03/JMR-Economics_of_Security_Goups.ppt The Economic Advantages of a Resilient Supply Chain- Software Security]&lt;br /&gt;
&lt;br /&gt;
=== May 2009 ===&lt;br /&gt;
''Eric Dalci, Cigital Inc.'':''Introduction to Static Analysis''&amp;lt;BR&amp;gt;&lt;br /&gt;
Later, a panel:&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Steven Lavenhar, Booz Allen Hamilton;&lt;br /&gt;
&amp;lt;LI&amp;gt;Eric Dalci, Cigital Inc.&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
Panel moderated by John Steven&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This session is an introductory to Static Analysis. This session presents the different types of analysis used by today's Static Analysis tools. Examples of direct application to find vulnerabilities will be shown (ex: Data Flow Analysis, Semantic, Control Flow, etc.). Current limitations of Static Analysis will also be exposed. This session is tool agnostic, but will cover the approach taken by various leading commercial (as well as open-source) tools.&lt;br /&gt;
&lt;br /&gt;
Download: [http://www.owasp.org/images/e/ea/OWASP_Virginia_Edalci_May09.pdf Intro to Static Analysis]&lt;br /&gt;
&lt;br /&gt;
=== April 2009 ===&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security'': '''Top 10 Web Hacking Techniques 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
Jeremiah Spoke on (what he and colleagues determined were the) top ten web hacking techniques of 2008. This talk was a preview of his RSA '09 talk.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Download http://www.whitehatsec.com/home/assets/presentations/09PPT/PPT_OWASPNoVA04082008.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Later,&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Nate Miller, Stratum Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Jeremiah Grossman, Whitehat Security;&lt;br /&gt;
&amp;lt;LI&amp;gt;Tom Brennan, Whitehat Security; and&lt;br /&gt;
&amp;lt;LI&amp;gt;Wade Woolwine, AOL&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
served as penetration testing panels answering questions posed and moderated by Ken Van Wyk.&lt;br /&gt;
&lt;br /&gt;
=== February 2009 ===&lt;br /&gt;
&lt;br /&gt;
''Ryan C. Barnett, Breach Security'': '''Patching Challenge: Securing WebGoat with ModSecurity'''&lt;br /&gt;
&lt;br /&gt;
Identification of web application vulnerabilities is only half the battle with remediation efforts as the other. Let's face the facts, there are many real world business scenarios where it is not possible to update web application code in either a timely manner or at all. This is where the tactical use-case of implementing a web application firewall to address identified issues proves its worth.&lt;br /&gt;
&lt;br /&gt;
This talk will provide an overview of the recommended practices for utilizing a web application firewall for virtual patching. After discussing the framework to use, we will then present a very interesting OWASP Summer of Code Project where the challenge was to attempt to mitigate as many of the OWASP WebGoat vulnerabilities as possible using the open source ModSecurity web application firewall. During the talk, we will discuss both WebGoat and ModSecurity and provide in-depth walk-throughs of some of the complex fixes. Examples will include addressing not only attacks but the underlying vulnerabilities, using data persistence for multiple-step processes, content injection and even examples of the new LUA programming language API. The goal of this talk is to both highlight cutting edge mitigation options using a web application firewall and to show how it can effectively be used by security consultants who traditionally could only offer source code fixes.&lt;br /&gt;
&lt;br /&gt;
Ryan C. Barnett is the Director of Application Security Research at Breach Security and leads Breach Security Labs. He is also a Faculty Member for the SANS Institute, Team Lead for the Center for Internet Security Apache Benchmark Project and a Member of the Web Application Security Consortium where he leads the Distributed Open Proxy Honeypot Project. Mr. Barnett has also authored a web security book for Addison/Wesley Publishing entitled &amp;quot;Preventing Web Attacks with Apache.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
(This talk is a preview of Ryan's talk at Blackhat Federal the following week - see https://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Barnett )&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Virtual_Patching_Ryan_Barnett_Blackhat_Federal_09.zip| WAF Virtual Patching Challenge: Securing WebGoat with ModSecurity]]&lt;br /&gt;
&lt;br /&gt;
''John Steven, Cigital'': '''Moving Beyond Top N Lists'''&lt;br /&gt;
&lt;br /&gt;
Download [[Media:Moving_Beyond_Top_N_Lists.ppt.zip| Moving Beyond Top N Lists]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cigital published an article: The Top 11 Reasons Why Top 10 (or 25) Lists Don’t Work. Yet, these lists are a staple of conference abstracts, industry best practice lists, and the like. Are they good or bad? We’ll explore how to get beyond the Top 10 (or 25) list in making your software security effort real.&lt;br /&gt;
&lt;br /&gt;
John is Senior Director, Advanced Technology Consulting at Cigital. His experience includes research in static code analysis and hands-on architecture and implementation of high-performance, scalable Java EE systems. John has provided security consulting services to a broad variety of commercial clients including two of the largest trading platforms in the world and has advised America's largest internet provider in the Midwest on security and forensics. John led the development of Cigital's architectural analysis methodology and its approach to deploying enterprise software security frameworks. He has demonstrated success in building Cigital's intellectual property for providing cutting-edge security. He brings this experience and a track record of effective strategic innovation to clients seeking to change, whether to adopt more cutting-edge approaches, or to solidify ROI. John currently chairs the SD Best Practices security track and co-edits the building security in department of IEEE's Security and Privacy magazine. John has served on numerous conference panels regarding software security, wireless security and Java EE system development. He holds a B.S. in Computer Engineering and an M.S. in Computer Science from Case Western Reserve University.&lt;br /&gt;
&lt;br /&gt;
=== January 2009 ===&lt;br /&gt;
&lt;br /&gt;
To kick off 2009, our January meeting featured a discussion of the relationship between application security and CMMI, and an overview of the OWASP ASVS project.&lt;br /&gt;
&lt;br /&gt;
''Michele Moss, Booz Allen Hamilton'': '''Evolutions In The Relationship Between Application Security And The CMMI'''&lt;br /&gt;
 &lt;br /&gt;
Addressing new and complex threats and IT security challenges requires repeatable, reliable, rapid, and cost effective solutions.  To implement these solutions, organizations have begun to align their security improvement efforts with their system and software development practices.  During a “Birds of a Feather” at the March 2007 SEPG, a group of industry representatives initiated an effort which led to the definition of assurance practices that can be applied in the context of the CMMI. This presentation will provide an understanding how applying the assurance practices in the context of security contribute to the overall increased quality of products and services, illustrate how the a focus on assurance in the context of CMMI practices is related to application security practices, and present and approach to evaluate and improve the repeatability and reliability of assurance practices. &lt;br /&gt;
 &lt;br /&gt;
Michele Moss, CISSP, is a security engineer with more than 12 years of experience in process improvement. She specializes in integrating assurance processes and practices into project lifecycles. Michele is the Co-Chair of the DHS Software Assurance Working Group on Processes &amp;amp; Practices. She has assisted numerous organizations with maturing their information technology, information assurance, project management, and support practices through the use of the capability maturity models including the CMMI, and the SSE-CMM. She is one of the key contributors in an effort to apply an assurance focus to CMMI.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Moss-AppSecurityAndCMMI.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Mike Boberski, Booz Allen Hamilton'': '''About OWASP ASVS'''&lt;br /&gt;
&lt;br /&gt;
The primary aim of the OWASP ASVS Project is to normalize the range&lt;br /&gt;
of coverage and level of rigor available in the market when it comes to&lt;br /&gt;
performing application-level security verification. The goal is to&lt;br /&gt;
create a set of commercially-workable open standards that are tailored&lt;br /&gt;
to specific web-based technologies.&lt;br /&gt;
&lt;br /&gt;
Mike Boberski works at Booz Allen Hamilton. He has a background in&lt;br /&gt;
application security and the use of cryptography by applications. He is&lt;br /&gt;
experienced in trusted product evaluation, security-related software&lt;br /&gt;
development and integration, and cryptomodule testing. For OWASP, he is&lt;br /&gt;
the project lead and a co-author of the  OWASP Application Security&lt;br /&gt;
Verification Standard, the first OWASP standard.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[https://www.owasp.org/images/5/52/About_OWASP_ASVS_Web_Edition.ppt]]&lt;br /&gt;
&lt;br /&gt;
=== November 2008 ===&lt;br /&gt;
For our November 2008 meeting, we had two great presentations on software assurance and security testing.&lt;br /&gt;
&lt;br /&gt;
''Nadya Bartol, Booz Allen Hamilton'': '''Framework for Software Assurance'''&lt;br /&gt;
&lt;br /&gt;
Nadya's presentation will provide an update on the Software Assurance&lt;br /&gt;
Forum efforts to establish a comprehensive framework for software&lt;br /&gt;
assurance (SwA) and security measurement.  The Framework addresses&lt;br /&gt;
measuring achievement of SwA goals and objectives within the context of&lt;br /&gt;
individual projects, programs, or enterprises.  It targets a variety of&lt;br /&gt;
audiences including executives, developers, vendors, suppliers, and&lt;br /&gt;
buyers.  The Framework leverages existing measurement methodologies,&lt;br /&gt;
including Practical Software and System Measurement (PSM); CMMI Goal,&lt;br /&gt;
Question, Indicator, Measure (GQ(I)M);  NIST SP 800-55 Rev1; and ISO/IEC&lt;br /&gt;
27004 and identifies commonalities among the methodologies to help&lt;br /&gt;
organizations integrate SwA measurement in their overall measurement&lt;br /&gt;
efforts cost-effectively and as seamlessly as possible, rather than&lt;br /&gt;
establish a standalone SwA measurement effort within an organization.&lt;br /&gt;
The presentation will provide an update on the SwA Forum Measurement&lt;br /&gt;
Working Group work, present the current version of the Framework and underlying measures&lt;br /&gt;
development and implementation processes, and propose example SwA&lt;br /&gt;
measures applicable to a variety of SwA stakeholders.  The presentation&lt;br /&gt;
will update the group on the latest NIST and ISO standards on&lt;br /&gt;
information security measurement that are being integrated into the&lt;br /&gt;
Framework as the standards are being developed.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Bartol-MeasurementForOWASP11-13-08.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Paco Hope, Cigital'': '''The Web Security Testing Cookbook'''&lt;br /&gt;
&lt;br /&gt;
The Web Security Testing Cookbook (O'Reilly &amp;amp; Associates, October 2008)&lt;br /&gt;
gives developers and testers the tools they need to make security&lt;br /&gt;
testing a regular part of their development lifecycle. Its recipe style&lt;br /&gt;
approach covers manual, exploratory testing as well automated techniques&lt;br /&gt;
that you can make part of your unit tests or regression cycle. The&lt;br /&gt;
recipes cover the basics like observing messages between clients and&lt;br /&gt;
servers, to multi-phase tests that script the login and execution of web&lt;br /&gt;
application features. This book complements many of the security texts&lt;br /&gt;
in the market that tell you what a vulnerability is, but not how to&lt;br /&gt;
systematically test it day in and day out. Leverage the recipes in this&lt;br /&gt;
book to add significant security coverage to your testing without adding&lt;br /&gt;
significant time and cost to your effort.&lt;br /&gt;
&lt;br /&gt;
Congratulations to Tim Bond who won an autographed copy of Paco's book.&lt;br /&gt;
Get your copy here [[http://www.amazon.com/Security-Testing-Cookbook-Paco-Hope/dp/0596514832]]&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/PacoHope-WebSecCookbook.pdf]]&lt;br /&gt;
&lt;br /&gt;
=== October 2008 ===&lt;br /&gt;
For our October 2008 meeting, we had two fascinating talks relating to forensics.&lt;br /&gt;
&lt;br /&gt;
''Dave Merkel, Mandiant'': '''Enterprise Grade Incident Management - Responding to Persistent Threats'''&lt;br /&gt;
&lt;br /&gt;
Dave Merkel is Vice President of Products at Mandiant, a leading provider of information security services, education and products. Mr. Merkel has worked in the information security and incident response industry for over 10 years. His background includes service as a federal agent in the US Air Force and over 7 years experience directing security operations at America Online. He currently oversees the product business at Mandiant, and is in charge of building Mandiant Intelligent Response - an enterprise incident response solution. But no, he won't be selling you anything today.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/Mandiant-EnterpriseIRandAPTpresentation.pdf]]&lt;br /&gt;
&lt;br /&gt;
''Inno Eroraha, NetSecurity'': '''[Responding to the Digital Crime Scene: Gathering Volatile Data'''&lt;br /&gt;
&lt;br /&gt;
Inno Eroraha is the founder and chief strategist of NetSecurity Corporation, a company that provides digital forensics, hands-on security consulting, and Hands-on How-To® training solutions that are high-quality, timely, and customer-focused. In this role, Mr. Eroraha helps clients plan, formulate, and execute the best security and forensics strategy that aligns with their business goals and priorities. He has consulted with Fortune 500 companies, IRS, DHS, VA, DoD, and other entities.&lt;br /&gt;
&lt;br /&gt;
Slides available: [[http://www.epsteinmania.com/owasp/NetSecurity-RespondingToTheDigitalCrimeScene-GatheringVolatileData-TechnoForensics-102908.pdf] ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Knowledge ====&lt;br /&gt;
&lt;br /&gt;
The Northern Virginia (NoVA) chapter is committed to compiling resources on interesting and valuable topic areas. We hope that this structure helps you access information pertinent to your tasks at hand as you move through a secure application development life cycle. Currently, our topic areas of focus include activities such as:&lt;br /&gt;
&lt;br /&gt;
* Threat Modeling&lt;br /&gt;
* [[Code Review and Static Analysis with tools]]&lt;br /&gt;
* Penetration Testing and Dynamic Analysis tools&lt;br /&gt;
* Monitoring/Dynamic patching (WAFs)&lt;br /&gt;
&lt;br /&gt;
Certain projects our members are involved in cross-cut these activities, providing value throughout. They include:&lt;br /&gt;
&lt;br /&gt;
* ASVS&lt;br /&gt;
&lt;br /&gt;
=== Static Analysis Curriculum ===&lt;br /&gt;
&lt;br /&gt;
* For an introduction to the OWASP Static Analysis (SA) Track goals, objectives, and session roadmap, please see [http://www.owasp.org/index.php/Image:OWASP_NoVA_SA_Track_Final_20090408.ppt this presentation].&lt;br /&gt;
&lt;br /&gt;
The following is the agenda of the OWASP Static Analysis track roadmap for the [http://www.owasp.org/index.php/Virginia_(Northern_Virginia) Northern Virginia Chapter].&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp SAtrack plan.png|OWASP Static Analysis Roadmap - Northern Virginia Chapter 2009]]&lt;br /&gt;
&lt;br /&gt;
'''Contacts'''&amp;lt;br&amp;gt;&lt;br /&gt;
Questions related to this curriculum should be sent to [mailto:John.Steven@owasp.org John Steven], who is the Northern Virginia chapter leader.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Flash Talk Resources ===&lt;br /&gt;
&lt;br /&gt;
Chandu Ketkar on OFS. Download: [http://www.owasp.org/images/1/1c/OFS.pptx OFS Presentation.] &amp;lt;BR/&amp;gt;&lt;br /&gt;
[http://jack-mannino.blogspot.com/ Jack Mannino] on Google and Searching for Personal Information &amp;lt;BR/&amp;gt;&lt;br /&gt;
Jesse Ou on XML Bombs.  Download: [http://www.owasp.org/images/1/18/OWASP_JOU_XML_DTD_Attacks.pptx XML DTD Presentation] &amp;lt;BR/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Contributors and Sponsors ====&lt;br /&gt;
&lt;br /&gt;
'''Chapter Leader'''&lt;br /&gt;
&lt;br /&gt;
* [mailto:John.Steven@owasp.org John Steven], with assistance from [mailto:paco@cigital.com Paco Hope], [mailto:wisseman_stan@bah.com Stan Wisseman], and [mailto:btomhave@geminisecurity.com Ben Tomhave].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Refreshment Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Cigital_OWASP.GIF|link=http://www.cigital.com/]]&lt;br /&gt;
&lt;br /&gt;
[[Image:Gemini-logo.png|link=http://geminisecurity.com/]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Facility Sponsors'''&lt;br /&gt;
&lt;br /&gt;
[[Image:Bah-bw.JPG|215px|link=http://www.bah.com/]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Northern Virginia&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
[[Category:Virginia]]&lt;br /&gt;
[[Category:Washington, DC]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Software_Security_Best_Practices&amp;diff=91196</id>
		<title>Software Security Best Practices</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Software_Security_Best_Practices&amp;diff=91196"/>
				<updated>2010-10-11T14:53:21Z</updated>
		
		<summary type="html">&lt;p&gt;Benjamin Tomhave: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
[[Image:468x60-banner-2010.gif|link=http://www.owasp.org/index.php?title=OWASP_AppSec_DC_2010]] &lt;br /&gt;
&lt;br /&gt;
[https://guest.cvent.com/EVENTS/Register/IdentityConfirmation.aspx?e=d52c6f5f-d568-4e16-b8e0-b5e2bf87ab3a Registration] | [https://resweb.passkey.com/Resweb.do?mode=welcome_gi_new&amp;amp;groupID=2766908 Hotel] | [http://www.dcconvention.com/ Walter E. Washington Convention Center]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 2 Days'''&lt;br /&gt;
&lt;br /&gt;
This hands-on tutorial starts with a description of the security problems faced by today's software developer, as well as a detailed description of how defective software can be exploited. It goes on to provide a thorough description of the best practices available to prevent, detect, and remediate security problems in software. Next, the tutorial includes hands-on design review exercises to reinforce each of the concepts presented, together with dozens of examples of common coding errors (primarily in C/C++ and Java).&lt;br /&gt;
&lt;br /&gt;
==Student Requirements==&lt;br /&gt;
&lt;br /&gt;
All students will be expected to bring their own laptop running a copy of the OWASP Live CD.  To expedite course delivery, students should test the functionality of the OWASP Live CD on their system prior to arrival.&lt;br /&gt;
http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project&lt;br /&gt;
&lt;br /&gt;
Specifically, please ensure that you're able to run the &amp;quot;AppSecEU May 2009 Release&amp;quot; of the OWASP Live CD, which can be downloaded either as an ISO, Virtual Box image, or VMWare image from:&lt;br /&gt;
[http://appseclive.org/node/45 http://appseclive.org/node/45]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
Skill: Intermediate&lt;br /&gt;
&lt;br /&gt;
# In-depth understanding of the software security problem space&lt;br /&gt;
# Hands-on experience identifying and remediating OWASP Top 10 vulnerabilities&lt;br /&gt;
# Hands-on experience with common software security tools&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Instructor==&lt;br /&gt;
'''Instructor: Ben Tomhave ''' is a Senior Security Analyst with Gemini Security Solutions in Chantilly, VA, specializing in solutions architecture, security planning, program development and management, and other strategic security solutions. He holds a MS in Engineering Management with an Information Security Management concentration from The George Washington University and is a CISSP. &lt;br /&gt;
&lt;br /&gt;
His experience includes developing and delivering course materials internally and for the formal classroom environment. Course delivery covers areas such as security awareness, information security fundamentals, and application security. Ben has been specially trained and authorized to deliver this program by Ken van Wyk of KRvW Associates, LLC, to clients and AppSec DC 2010 students.&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2010_Training]] [[Category:Intermediate_Training]]&lt;/div&gt;</summary>
		<author><name>Benjamin Tomhave</name></author>	</entry>

	</feed>