<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bernie+K+Wong</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bernie+K+Wong"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bernie_K_Wong"/>
		<updated>2026-05-02T23:12:51Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=152378</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=152378"/>
				<updated>2013-05-28T13:44:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]. The Boston chapter is grateful for support from:&lt;br /&gt;
&lt;br /&gt;
[[Image:AuricLogo_160.png|link=http://www.auricsystems.com/|Auric Systems International]]&amp;lt;br/&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings --- Our Eighth Year ==&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color:red;font-size:120%&amp;quot;&amp;gt;Please Note New Location:&amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
We no longer meet in Waltham or at our old Cambridge meeting place. Most meetings will now happen at '''[http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Meetings ===&lt;br /&gt;
&lt;br /&gt;
 '''June 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''We see the future…and it isn’t pretty'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Andrea Mulligan, Sr. Director at Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future. &lt;br /&gt;
&lt;br /&gt;
=== Past Meetings ===&lt;br /&gt;
&lt;br /&gt;
 '''May 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Systems Thinking + Web Security'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Akamai'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, May 1, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Akamai will present on ‘Systems Thinking + Web Security’. There will also be an audience review exercise facilitated by the Akamai presenters.  This is a great chance to hear some interesting perspectives on web security from Akamai, who handles about one third of all internet traffic.&lt;br /&gt;
&lt;br /&gt;
 '''April 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Sonotype'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
* Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important. &lt;br /&gt;
* Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.&lt;br /&gt;
* OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are. &lt;br /&gt;
* OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.&lt;br /&gt;
* OSS Component Policy Examples&lt;br /&gt;
* Example Application Compositions Reports&lt;br /&gt;
* Example Use cases IDE, CI, repository, production applications&lt;br /&gt;
* Discussion&lt;br /&gt;
&lt;br /&gt;
About Sonatype:&lt;br /&gt;
&lt;br /&gt;
Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository. &lt;br /&gt;
&lt;br /&gt;
 '''March 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''What is BSIMM?'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Nabil Hannan'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.&lt;br /&gt;
 &lt;br /&gt;
The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.  &lt;br /&gt;
&lt;br /&gt;
BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers. &lt;br /&gt;
&lt;br /&gt;
The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''BroBot'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Eric Kobrin, Akamai'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.&lt;br /&gt;
 &lt;br /&gt;
His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:&lt;br /&gt;
&lt;br /&gt;
* Vulnerable system discovery&lt;br /&gt;
* Zombie compromise&lt;br /&gt;
* Control structure&lt;br /&gt;
* Attack traffic&lt;br /&gt;
* Mitigation steps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Third-Party Application Analysis: Best Practices and Lessons Learned'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Chad Holmes, Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.&lt;br /&gt;
&lt;br /&gt;
The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some.  The order of the presentation is:&lt;br /&gt;
&lt;br /&gt;
·         Adoption rates of externally developed software&lt;br /&gt;
&lt;br /&gt;
·         The risk within those apps&lt;br /&gt;
&lt;br /&gt;
·         Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)&lt;br /&gt;
&lt;br /&gt;
·         Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)&lt;br /&gt;
&lt;br /&gt;
·         Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)&lt;br /&gt;
&lt;br /&gt;
·         Best Practices for high rates of adoption&lt;br /&gt;
&lt;br /&gt;
·         Lessons Learned and Recommendations&lt;br /&gt;
&lt;br /&gt;
Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.&lt;br /&gt;
&lt;br /&gt;
 '''June 2012'''&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker '''Will Vandevanter - Rapid 7'''&lt;br /&gt;
&lt;br /&gt;
'''Fingerprinting web applications of all kinds'''&lt;br /&gt;
&lt;br /&gt;
This turbo talk will introduce a new Metasploit module that fingerprints &amp;quot;known&amp;quot; web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others. &lt;br /&gt;
&lt;br /&gt;
Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 '''May 31 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Jobspring, Boston. 545 Boylston st. &lt;br /&gt;
&lt;br /&gt;
Speaker - '''Glenn Gramling, Vice President, Cenzic'''&lt;br /&gt;
&lt;br /&gt;
“Cloudy with a Chance of Hack”&lt;br /&gt;
&lt;br /&gt;
Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of &amp;quot;stormy weather.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Glenn Gramling is responsible for global sales and business development for Cenzic’s  application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 11, 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker - '''David Eoff, Senior Product Marketing Manager, HP Enterprise Security'''&lt;br /&gt;
&lt;br /&gt;
David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.&lt;br /&gt;
&lt;br /&gt;
Topic - '''Gray, the New Black:  Gray-Box Vulnerability Testing'''&lt;br /&gt;
&lt;br /&gt;
Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software:  Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST).  While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions:  information about the inner workings and behavior of applications undergoing DAST and SAST analysis.&lt;br /&gt;
 &lt;br /&gt;
This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers.  It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.&lt;br /&gt;
&lt;br /&gt;
 '''March 8, 2012, with the Boston Security Meetup group'''&lt;br /&gt;
&lt;br /&gt;
Location - [http://maps.google.com/maps?q=Jobspring+Partners,+Boylston+Street,+Boston,+MA&amp;amp;hl=en&amp;amp;sll=42.362243,-71.081628&amp;amp;sspn=0.019549,0.037594&amp;amp;oq=jobspring&amp;amp;t=v&amp;amp;hq=Jobspring+Partners,&amp;amp;hnear=Boylston+St,+Boston,+Massachusetts&amp;amp;z=17 JobSpring, Boylston St.]&lt;br /&gt;
&lt;br /&gt;
Topic - '''Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers'''&lt;br /&gt;
&lt;br /&gt;
Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.&lt;br /&gt;
 &lt;br /&gt;
Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.&lt;br /&gt;
 &lt;br /&gt;
Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.&lt;br /&gt;
 &lt;br /&gt;
The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.&lt;br /&gt;
 &lt;br /&gt;
Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come. &lt;br /&gt;
&lt;br /&gt;
 '''December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room'''&lt;br /&gt;
&lt;br /&gt;
'''Jeremiah Grossman – Founder and CTO WhiteHat Security'''&lt;br /&gt;
 &lt;br /&gt;
Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
 '''September 14 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz   -  OWASP O2 Platform'''&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). &lt;br /&gt;
&lt;br /&gt;
 '''September 7 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Adriel Desautels –  Differences between Penetration Testing and Vulnerability Scanning'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July  2011'''&lt;br /&gt;
&lt;br /&gt;
'''Anurag Agarwal, the founder of MyAppSecurity'''&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ==&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston &amp;lt;br/&amp;gt;&lt;br /&gt;
35 Wachusett Dr &amp;lt;br/&amp;gt;&lt;br /&gt;
Lexington, MA 02421 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
[[2012 BASC Homepage|Boston Application Security Conference 2012]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boston OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=152306</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=152306"/>
				<updated>2013-05-28T13:06:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]. The Boston chapter is grateful for support from:&lt;br /&gt;
&lt;br /&gt;
[[Image:AuricLogo_160.png|link=http://www.auricsystems.com/|Auric Systems International]]&amp;lt;br/&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings --- Our Eighth Year ==&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
'''&amp;lt;span style=&amp;quot;color:red;font-size:120%&amp;quot;&amp;gt;Please Note New Location:&amp;lt;/span&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
We no longer meet in Waltham or at our old Cambridge meeting place. Most meetings will now happen at '''[http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Upcoming Meetings ===&lt;br /&gt;
&lt;br /&gt;
 '''June 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''We see the future…and it isn’t pretty'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Andrea Mulligan, Sr. Director at Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, June 5, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
In this session Andrea presents research findings from the State of Software Security Report, which offers a before the breach look at security by examining the flaws commonly found in applications of all kinds. She will also examine what the research findings mean for security, predict how these flaws could cause history to repeat itself, and discuss how security pros can help change the future. &lt;br /&gt;
&lt;br /&gt;
=== Past Meetings ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Go Fast. Be Secure: Effectively Govern the Use of Open Source Components Throughout the SDLC'''&lt;br /&gt;
&lt;br /&gt;
Presented by: '''Sonotype'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, April 3, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
* Open Source Software (OSS) Component supply chain complexities and realities. Open source is constantly changing and knowing the version in your software, as well as the current version history of the component (how do you show an auditor you are using a current version) is important. &lt;br /&gt;
* Open Source Consumption Patterns from the Central Repository. Which versions are the most popular can tell you which versions are the most stable, useful, secure etc.&lt;br /&gt;
* OWASP Top 10 (A9) - Using Components with Known Vulnerabilities. To decide on the risk of OSS components with vulnerabilities, you need to know the vulnerabilities, their severity and which components they occur in as well as where in the code dependency tree they are. &lt;br /&gt;
* OSS Security, Quality and License policies must be woven into the development process. Knowing the number and type of open source licenses in your software can be important to the legal standing of your code and if it conflicts with any corporate standards. The licensing is also important in order to know the restrictions on changing the software.&lt;br /&gt;
* OSS Component Policy Examples&lt;br /&gt;
* Example Application Compositions Reports&lt;br /&gt;
* Example Use cases IDE, CI, repository, production applications&lt;br /&gt;
* Discussion&lt;br /&gt;
&lt;br /&gt;
About Sonatype:&lt;br /&gt;
&lt;br /&gt;
Sonatype operates the Central Repository, the industry's primary source for open-source components, housing more than 400,000 components and serving more than five billion requests per year from more than 60,000 organizations. The company has been a pioneer in component-based software development since its founding by Jason van Zyl, the creator of the Apache Maven build management system and the Central Repository. &lt;br /&gt;
&lt;br /&gt;
 '''March 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''What is BSIMM?'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Nabil Hannan'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Nabil is Director of Vulnerability Assessments and Managing Consultant at Cigital.&lt;br /&gt;
 &lt;br /&gt;
The purpose of the BSIMM is to quantify the activities carried out by real software security initiatives. BSIMM is a study of the secure development practices of over 50 organizations, analyzed along the dimensions that were found in the data, not along preconceived ideas of what secure development should be.  &lt;br /&gt;
&lt;br /&gt;
BSIMM describes the work of 974 software security group members working with a satellite of 2039 people to secure the software developed by 218,286 developers. &lt;br /&gt;
&lt;br /&gt;
The BSIMM describes 111 activities that any organization can put into practice. The activities are described in twelve practices grouped into four domains. Associated with each activity is an objective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''BroBot'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Eric Kobrin, Akamai'''&lt;br /&gt;
&lt;br /&gt;
When: Wednesday, February 6, 6:30 pm&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Eric Kobrin is a Senior Security Architect in the Infosec organization of Akamai Technologies, the global leader in Cloud-based application acceleration and content delivery. Eric has been involved in Software Architecture for over 15 years, having worked at such companies and IBM, Velocitude and eDiets.com. He has a passion for programming languages, security, and software performance and has worked in all layers of the software stack from hypervisors to complex servers and web applications. Eric's works have been published, presented at international conferences and patented.&lt;br /&gt;
 &lt;br /&gt;
His presentation will provide an analysis of the BroBot DDOS attacks, including discussion of:&lt;br /&gt;
&lt;br /&gt;
* Vulnerable system discovery&lt;br /&gt;
* Zombie compromise&lt;br /&gt;
* Control structure&lt;br /&gt;
* Attack traffic&lt;br /&gt;
* Mitigation steps&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2013'''&lt;br /&gt;
&lt;br /&gt;
Topic: '''Third-Party Application Analysis: Best Practices and Lessons Learned'''&lt;br /&gt;
&lt;br /&gt;
Speaker: '''Chad Holmes, Veracode'''&lt;br /&gt;
&lt;br /&gt;
Location: [http://www.akamai.com/html/about/locations.html Akamai] at 8 Cambridge Center in Cambridge, MA&lt;br /&gt;
&lt;br /&gt;
Chad Holmes will present details of the work Veracode has been doing with their 3rd Party program, discuss the technical and business challenges that have arisen during that time and lead a discussion on what team members can do to help drive adoption of security best practices across their vendor community.&lt;br /&gt;
&lt;br /&gt;
The flow of the presentation is designed to drive discussion within an audience – both from a technical and business perspective with some anecdotal stories. Chad wants this to be an interactive discussion so he’ll have questions and you should bring yours I’ve already sent him some.  The order of the presentation is:&lt;br /&gt;
&lt;br /&gt;
·         Adoption rates of externally developed software&lt;br /&gt;
&lt;br /&gt;
·         The risk within those apps&lt;br /&gt;
&lt;br /&gt;
·         Some deeper stats on what “3rd party” really means (total outsourcing/total COTS produced/open source/imported libraries/etc)&lt;br /&gt;
&lt;br /&gt;
·         Some raw data about our experiences (to show this is based on a large sample size rather than “Look how awesome Veracode is!”)&lt;br /&gt;
&lt;br /&gt;
·         Challenges that will be faced (business, intellectual property, policy, analysis capabilities, etc)&lt;br /&gt;
&lt;br /&gt;
·         Best Practices for high rates of adoption&lt;br /&gt;
&lt;br /&gt;
·         Lessons Learned and Recommendations&lt;br /&gt;
&lt;br /&gt;
Chad Holmes has over 10 years of software development and application security experience. During his time at Veracode, Chad has lead the redesign and execution of the third-party analysis process to allow for a more streamlined approach while still addressing common ISV intellectual property concerns. In addition to his third-party analysis responsibilities, Chad's previous work as a Security Program Manager has lead to the successful roll out and improvement of multiple corporate application security groups.&lt;br /&gt;
&lt;br /&gt;
 '''June 2012'''&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker '''Will Vandevanter - Rapid 7'''&lt;br /&gt;
&lt;br /&gt;
'''Fingerprinting web applications of all kinds'''&lt;br /&gt;
&lt;br /&gt;
This turbo talk will introduce a new Metasploit module that fingerprints &amp;quot;known&amp;quot; web applications, attempts the default credentials for the application, and runs an associated exploit or authenticated access module if applicable. Some example fingerprints in the database target common enterprise web applications including Microsoft products (Outlook Web Access, Sharepoint), printers (Xerox Document Centre), security cameras, routers, and others. &lt;br /&gt;
&lt;br /&gt;
Will Vandevanter is a senior penetration tester and researcher at Rapid7. His focus interests include web application security and secure code. He has previously spoken at Defcon, SOURCE, BSides LV, and other conferences. &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
 '''May 31 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Jobspring, Boston. 545 Boylston st. &lt;br /&gt;
&lt;br /&gt;
Speaker - '''Glenn Gramling, Vice President, Cenzic'''&lt;br /&gt;
&lt;br /&gt;
“Cloudy with a Chance of Hack”&lt;br /&gt;
&lt;br /&gt;
Cloud computing is a cost effective and efficient way for enterprises to automate their processes. However organizations need to be aware of the pitfalls of the many cloud solutions out there - one of the main being security. Most cloud applications were built for ease of use and without security necessarily in mind. Companies need to be asking their solution providers about the security measures used in developing the application and get an independent verification to make sure there are no gaping holes. With over 75% of attacks occurring through the Web, any attack through these applications can lead to leakage of confidential information and embarrassment. In this session, we'll give attendees tips and tricks to prepare them for the potential of &amp;quot;stormy weather.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Glenn Gramling is responsible for global sales and business development for Cenzic’s  application security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 11, 2012'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
Speaker - '''David Eoff, Senior Product Marketing Manager, HP Enterprise Security'''&lt;br /&gt;
&lt;br /&gt;
David is a Senior Product Marketing Manager, within the Enterprise Security Products division of HP focused on Fortify application security. His 18+ years of background in software and hardware enterprise marketing provides a solid foundation for his marketing of the HP security solutions. &lt;br /&gt;
 &lt;br /&gt;
Prior to joining Fortify in 2009 and being acquired by HP, David ran Firewall and IPS marketing for the Security division of Nokia Corporation. In addition, he has held multiple positions in product marketing, product management, channel marketing and sales while working for Oracle, EMC, Legato, BMC Software and several start-ups.&lt;br /&gt;
&lt;br /&gt;
Topic - '''Gray, the New Black:  Gray-Box Vulnerability Testing'''&lt;br /&gt;
&lt;br /&gt;
Over the years, two key techniques have emerged as the most effective for finding security vulnerabilities in software:  Dynamic Application Security Testing (DAST) and Static Application Security Testing (SAST).  While DAST and SAST each possess unique strengths, the “Holy Grail” of security testing is thought to be “hybrid” – a technique that combines and correlates the results from both testing methods, maximizing the advantages of each. Until recently, however, a critical element has been missing from first generation hybrid solutions:  information about the inner workings and behavior of applications undergoing DAST and SAST analysis.&lt;br /&gt;
 &lt;br /&gt;
This presentation will introduce you to the next generation of hybrid security analysis – what it is, how it works, and the benefits it offers.  It will also address (and dispel) the claims against hybrid, and leave you with a clear understanding of how the new generation of hybrid will enable organizations to resolve their most critical software security issues faster and more cost-effectively than any other available analysis technology.&lt;br /&gt;
&lt;br /&gt;
 '''March 8, 2012, with the Boston Security Meetup group'''&lt;br /&gt;
&lt;br /&gt;
Location - [http://maps.google.com/maps?q=Jobspring+Partners,+Boylston+Street,+Boston,+MA&amp;amp;hl=en&amp;amp;sll=42.362243,-71.081628&amp;amp;sspn=0.019549,0.037594&amp;amp;oq=jobspring&amp;amp;t=v&amp;amp;hq=Jobspring+Partners,&amp;amp;hnear=Boylston+St,+Boston,+Massachusetts&amp;amp;z=17 JobSpring, Boylston St.]&lt;br /&gt;
&lt;br /&gt;
Topic - '''Corporate Espionage for Dummies: The Hidden Threat of Embedded Web Servers'''&lt;br /&gt;
&lt;br /&gt;
Speaker - VP for Security Research at ZScaler, along with other speakers at the security meetup.&lt;br /&gt;
 &lt;br /&gt;
Today, everything from kitchen appliances to television sets come with an IP address. Network connectivity for various hardware devices opens up exciting opportunities. Forgot to lower the thermostat before leaving the house? Simply access it online. Need to record a show? Start the DVR with a mobile app. While embedded web servers are now as common as digital displays in hardware devices, sadly, security is not. What if that same convenience exposed photocopied documents online or allowed outsiders to record your telephone conversations? A frightening thought indeed.&lt;br /&gt;
 &lt;br /&gt;
Software vendors have been forced to climb the security learning curve. As independent researchers uncovered embarrassing vulnerabilities, vendors had little choice but to plug the holes and revamp development lifecycles to bake security into products. Vendors of embedded web servers have faced minimal scrutiny and as such are at least a decade behind when it comes to security practices. Today, network connected devices are regularly deployed with virtually no security whatsoever.&lt;br /&gt;
 &lt;br /&gt;
The risk of insecure embedded web servers has been amplified by insecure networking practices. Every home and small business now runs a wireless network, but it was likely set up by someone with virtually no networking expertise. As such, many devices designed only for LAN access are now unintentionally Internet facing and wide open to attack from anyone, regardless of their location.&lt;br /&gt;
 &lt;br /&gt;
Leveraging the power of cloud based services, Zscaler spent several months scanning large portions of the Internet to understand the scope of this threat. Our findings will make any business owner think twice before purchasing a 'wifi enabled' device. We'll share the results of our findings, reveal specific vulnerabilities in a multitude of appliances and discuss how embedded web servers will represent a target rich environment for years to come. &lt;br /&gt;
&lt;br /&gt;
 '''December 13, 2011, 6:30, Microsoft NERD, Cambridge, Horace Mann Room'''&lt;br /&gt;
&lt;br /&gt;
'''Jeremiah Grossman – Founder and CTO WhiteHat Security'''&lt;br /&gt;
 &lt;br /&gt;
Directions: http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
 '''September 14 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz   -  OWASP O2 Platform'''&lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is a library of scriptable objects specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). &lt;br /&gt;
&lt;br /&gt;
 '''September 7 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Adriel Desautels –  Differences between Penetration Testing and Vulnerability Scanning'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July  2011'''&lt;br /&gt;
&lt;br /&gt;
'''Anurag Agarwal, the founder of MyAppSecurity'''&lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ==&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston &amp;lt;br/&amp;gt;&lt;br /&gt;
35 Wachusett Dr &amp;lt;br/&amp;gt;&lt;br /&gt;
Lexington, MA 02421 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
[[2012 BASC Homepage|Boston Application Security Conference 2012]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boston OWASP Chapter Leaders  ==&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137607</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137607"/>
				<updated>2012-10-14T12:17:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Give each non-vendor non-presenter attendee a raffle ticket&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Brandon &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Brandon&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Jim Weiler&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
# Ming Chow &lt;br /&gt;
# Lucy Monahan&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137495</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137495"/>
				<updated>2012-10-10T18:41:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Give each non-vendor non-presenter attendee a raffle ticket&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
# Ming Chow &lt;br /&gt;
# Lucy Monahan&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137450</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137450"/>
				<updated>2012-10-10T00:30:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Tom Conner&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
# Ming Chow &lt;br /&gt;
# Lucy Monahan&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137178</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137178"/>
				<updated>2012-10-08T03:01:18Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Lucy Monahan&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
# Ming Chow &lt;br /&gt;
# Lucy Monahan&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137177</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137177"/>
				<updated>2012-10-08T02:23:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
# Ming Chow &lt;br /&gt;
# Lucy Monahan&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137164</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137164"/>
				<updated>2012-10-07T21:50:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
# Tom Conner&lt;br /&gt;
# Roy Wattanasin&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137163</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137163"/>
				<updated>2012-10-07T21:48:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;br /&gt;
&lt;br /&gt;
== Misc == &lt;br /&gt;
&lt;br /&gt;
Volunteers&lt;br /&gt;
1. Tom Conner&lt;br /&gt;
1. Roy Wattanasin&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
* General help - adhoc/discretionary&lt;br /&gt;
* Make sure sponsor signs at food times are changed and displayed - Breakfast, Lunch, Drinks&lt;br /&gt;
* Make sure room configurations are changed by NERD staff - &lt;br /&gt;
** Start with full combined Mann - Sampson - Thomas&lt;br /&gt;
** 9:50 or end  of keynote - split into 2 rooms  1. Mann; 2. Sampson/Thomas&lt;br /&gt;
** 5:00 pm - recombine Mann and Sampson/Thomas into full room&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137162</id>
		<title>2012 BASC Volunteers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_BASC_Volunteers&amp;diff=137162"/>
				<updated>2012-10-07T21:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: Created page with &amp;quot;= Volunteer Assignments =  == Registration Desk ==  {| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot; |- ! style=&amp;quot;border-style: ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Volunteer Assignments =&lt;br /&gt;
&lt;br /&gt;
== Registration Desk ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Volunteer&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 08:00 to 10:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale &amp;lt;br&amp;gt;2. Jennifer Stitt &amp;lt;br&amp;gt;3. George Johnson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 12:00&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 1. Lindaleigh Aberdale&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* Keep count of actual attendees&lt;br /&gt;
* Collect tickets if people have them&lt;br /&gt;
* Give each attendee,vendors and presenters &lt;br /&gt;
** 2 drink tickets&lt;br /&gt;
** printed agenda&lt;br /&gt;
** notepad and pen&lt;br /&gt;
* Note: Please guard the drink tickets - they are cash :)&lt;br /&gt;
&lt;br /&gt;
== Room Monitors ==&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;border-collapse: collapse; border-width: 1px; border-style: solid; border-color: #000&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Time Slot&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 1 &amp;lt;br&amp;gt;Horace Mann&lt;br /&gt;
! style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| Track 2 &amp;lt;br&amp;gt;Deborah Sampson&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 10:00 to 10:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 11:00 to 11:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 13:00 to 13:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 14:00 to 14:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 15:00 to 15:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| 16:00 to 16:50&lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
| style=&amp;quot;border-style: solid; border-width: 1px&amp;quot;| &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''Tasks'''&lt;br /&gt;
&lt;br /&gt;
* 1 monitor per room or presentation - we will need monitors for the two tracks/rooms. Each track has six time slots (10am, 11am, 1pm, 2pm, 3pm and 4pm)&lt;br /&gt;
* Introduce speaker - we will provide some sample introductions &lt;br /&gt;
* Give speaker pen set gift at end of presentation &lt;br /&gt;
* Provide 10 and 5 minute warnings to speaker&lt;br /&gt;
* Make sure room sponsor signs are visible at front of room&lt;br /&gt;
* Get AV help from front desk if needed&lt;br /&gt;
* Help speakers as needed&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116085</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116085"/>
				<updated>2011-08-22T01:26:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Gold Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[[File:Core_Logo_Final_Word_3_10-290.png|link=http://www.coresecurity.com//|CORE Security]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt; &lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt; &lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Gold Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Core_Logo_Final_Word_3_10-290.png|link=http://www.coresecurity.com//|CORE Security]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116084</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116084"/>
				<updated>2011-08-22T01:19:58Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt; &lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116083</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116083"/>
				<updated>2011-08-22T01:19:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt; &lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting all of our sponsors.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116082</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116082"/>
				<updated>2011-08-22T01:18:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt; &lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;tr&amp;gt;&lt;br /&gt;
   &amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt; &lt;br /&gt;
   &amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
   &amp;lt;tr&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
  &amp;lt;/tr&amp;gt;&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting [[2010 BASC Sponsors|all of our sponsors]].&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116081</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116081"/>
				<updated>2011-08-22T01:15:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Core_Logo_Final_Word_3_10-290.png|link=http://www.coresecurity.com//|CORE Security]]&amp;lt;/td&amp;gt; --&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;!-- &amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
--&amp;gt; &lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting [[2010 BASC Sponsors|all of our sponsors]].&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116080</id>
		<title>Template:2011 BASC:Sponsor Bar Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Sponsor_Bar_Template&amp;diff=116080"/>
				<updated>2011-08-22T01:13:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: Created page with &amp;quot;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt; &amp;lt;center&amp;gt; &amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt; &amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border:3px solid #EEEEEE;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:130%; font-weight:bold;&amp;quot;&amp;gt;Platinum Sponsors (Listed Alphabetically)&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;table width=&amp;quot;100%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Core_Logo_Final_Word_3_10-290.png|link=http://www.coresecurity.com//|CORE Security]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;[[File:Rapid7LogoSmall.png|link=http://www.rapid7.com|Rapid7]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot;&amp;gt;[[File:Safelight_logo_small.gif|link=http://safelightsecurity.com/|SafeLight Security]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:SI-Banner-238x57.jpg|link=http://www.securityinnovation.com|Security Innovation]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;25%&amp;quot;&amp;gt;[[File:boston-2010-source-277x70.jpg|link=http://www.sourceconference.com/|SOURCE]]&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;12%&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:110%; font-weight:bold;&amp;quot;&amp;gt;&lt;br /&gt;
We kindly thank our sponsors for their support. Please help us keep future BASCs free by viewing and visiting [[2010 BASC Sponsors|all of our sponsors]].&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:2011_BASC:Header_Template&amp;diff=116079</id>
		<title>Template:2011 BASC:Header Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:2011_BASC:Header_Template&amp;diff=116079"/>
				<updated>2011-08-22T01:12:29Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: Created page with &amp;quot;{{2011_BASC:Sponsor_Bar_Template}} == {{{1}}} ==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2011_BASC:Sponsor_Bar_Template}}&lt;br /&gt;
== {{{1}}} ==&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=116078</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=116078"/>
				<updated>2011-08-22T01:12:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{2011_BASC:Header_Template | Welcome}}&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: [http://basc2011.eventbrite.com/ Online registration] &lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=114694</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=114694"/>
				<updated>2011-07-28T01:48:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
 &lt;br /&gt;
==== Local News  ====&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat Modeling and Vulnerabilities Assessments are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
&lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. This session will also mention how companies worry about false positives coming out of a scanner technology but overlooking false negatives leading them in a false sense of security. This half presentation, half Q&amp;amp;A session will highlight what works and what doesn't work in scanner technology and present case studies where companies got hacked even after using scanners on their apps.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=114563</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=114563"/>
				<updated>2011-07-25T19:59:57Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
 &lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat Modeling and Vulnerabilities Assessments are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
&lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. This session will also mention how companies worry about false positives coming out of a scanner technology but overlooking false negatives leading them in a false sense of security. This half presentation, half Q&amp;amp;A session will highlight what works and what doesn't work in scanner technology and present case studies where companies got hacked even after using scanners on their apps.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=114101</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=114101"/>
				<updated>2011-07-18T14:10:35Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Session 1 - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat Modeling and Vulnerabilities Assessments are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Session 2 - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
&lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. This session will also mention how companies worry about false positives coming out of a scanner technology but overlooking false negatives leading them in a false sense of security. This half presentation, half Q&amp;amp;A session will highlight what works and what doesn't work in scanner technology and present case studies where companies got hacked even after using scanners on their apps.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=114100</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=114100"/>
				<updated>2011-07-18T14:08:56Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Topic - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat Modeling and Vulnerabilities Assessments are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Topic - False Positive, False Negative and False Sense of Security''' &lt;br /&gt;
&lt;br /&gt;
This interactive session will talk about the pros and cons of using black box testing tools and discuss their effectiveness in building a mature software security program. This session will also mention how companies worry about false positives coming out of a scanner technology but overlooking false negatives leading them in a false sense of security. This half presentation, half Q&amp;amp;A session will highlight what works and what doesn't work in scanner technology and present case studies where companies got hacked even after using scanners on their apps.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=113899</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=113899"/>
				<updated>2011-07-14T13:26:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Topic - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat Modeling and Vulnerabilities Assessments are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Scanning''' &lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=113812</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=113812"/>
				<updated>2011-07-13T00:38:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Topic - Managing Risk with Threat Modeling''' &lt;br /&gt;
&lt;br /&gt;
Threat &amp;amp; Vulnerabilities are gaining momentum at many companies today because of the recent hacks at Sony, PBS, CIA and other high profile companies that have a mature vulnerability assessment or static analysis process. Traditionally companies have relied on vulnerability assessment or static analysis tools to identify vulnerabilities but recent hacks have proved that it's not enough. The correct approach is to use threat modeling to identify vulnerabilities and vulnerability assessment or static analysis tools should be used to validate if that vulnerability is actually mitigated. More and more organizations have realized that identifying threats in the design phase and planning a mitigation strategy helps them in saving time, money, brand value and generally overall risk. Threat Modeling can help by guiding the Application Development Teams to ensure your Security Policies get properly coded into the Applications at time of Development.  By creating pre-approved methods of coding for your development teams, and applying them in a repeatable and scalable process, you can assist your development teams in building a secure application easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Scanning''' &lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal, the founder of MyAppSecurity, has proven record in providing customers with solutions related to security risk management.  Anurag is a former Director of Education Services at WhiteHat Security and has over 17 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, and GE Medical Systems to name a few.  He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines.&lt;br /&gt;
&lt;br /&gt;
A frequent speaker on web application security at various conferences, Anurag is actively involved with organizations such as the WASC (Web Application Security Consortium) and OWASP (Open Web Application Security Project).  He started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP Threat Modeling Methodology.  Along with the MyAppSecurity team, he looks forward to transforming the business of application security by offering solutions that every business can easily implement easily and effortlessly.&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=113431</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=113431"/>
				<updated>2011-07-06T03:45:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Security Threat Modeling – A New Tool''' &lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Scanning''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Anurag Agarwal is founder of MyAppSecurity where he provides solutions related to software security risk management. He is an ex-Director of Education Services at WhiteHat Security and has 15 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, GE Medical Systems, etc. He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines. He is a frequent speaker on web application security at various conferences, and maintains a website by the name of www.attacklabs.com, where he has published several proof of concepts on various attacks. He is actively involved with Web Application Security Consortium and OWASP and started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP developers guide. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=113430</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=113430"/>
				<updated>2011-07-06T03:43:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - 201 Jones Rd., Sixth Floor Waltham, MA &lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Security Threat Modeling – A New Tool''' &lt;br /&gt;
'''Topic - Web Application Scanning''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Anurag Agarwal is founder of MyAppSecurity where he provides solutions related to software security risk management. He is an ex-Director of Education Services at WhiteHat Security and has 15 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, GE Medical Systems, etc. He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines. He is a frequent speaker on web application security at various conferences, and maintains a website by the name of www.attacklabs.com, where he has published several proof of concepts on various attacks. He is actively involved with Web Application Security Consortium and OWASP and started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP developers guide. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=113429</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=113429"/>
				<updated>2011-07-06T03:41:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Monday July 25'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft Waltham''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Web Application Security Threat Modeling – A New Tool''' &lt;br /&gt;
'''Topic - Web Application Scanning''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Anurag Agarwal is founder of MyAppSecurity where he provides solutions related to software security risk management. He is an ex-Director of Education Services at WhiteHat Security and has 15 years of experience designing, developing, managing and securing web applications and has worked for companies like Citigroup, Cisco, HSBC Bank, GE Medical Systems, etc. He is an active contributor to the web application security field and has written several articles on secure design and coding for online magazines. He is a frequent speaker on web application security at various conferences, and maintains a website by the name of www.attacklabs.com, where he has published several proof of concepts on various attacks. He is actively involved with Web Application Security Consortium and OWASP and started the project on Web Application Security Scanner Evaluation Criteria and is currently a project leader for OWASP developers guide. &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=112650</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=112650"/>
				<updated>2011-06-22T18:31:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: [http://basc2011.eventbrite.com/ Online registration] &lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111957</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111957"/>
				<updated>2011-06-09T02:11:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: Follow [http://twitter.com/#!/BASConf @BASConf] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111956</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111956"/>
				<updated>2011-06-09T02:10:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: [http://twitter.com/#!/BASConf Follow @BASConf] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111955</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111955"/>
				<updated>2011-06-09T02:03:52Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: [http://twitter.com/#!/BASConf Follow us] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111954</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111954"/>
				<updated>2011-06-09T02:03:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
* Twitter: [http://twitter.com/#!/BASConf|Follow us] HashTag: #basc2011&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111920</id>
		<title>2011 BASC Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111920"/>
				<updated>2011-06-07T17:35:29Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2010_BASC:Section_Template | Summary}}&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Summary}} --&amp;gt;&lt;br /&gt;
The [[Boston |  OWASP Boston chapter]] would like to announce a call for papers for the 2011 Boston Application Security Conference (BASC) on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)] in Cambridge MA. &lt;br /&gt;
&lt;br /&gt;
This will be a free, one day informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. You can find more information about the BASC on the its [[2011_BASC_Homepage |homepage]].&lt;br /&gt;
&lt;br /&gt;
The BASC will have two parallel tracks. Track 1 will focus on the basics of application security and the practical uses of application security tools and techniques. Track 2 will focus on more advanced application security topics including research on application security as well as . &lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes which should include any time for Q&amp;amp;A.&lt;br /&gt;
&lt;br /&gt;
We hope to attract people who are new to application security as well as thought leaders who are experienced in application security. We expect the attendees to include application security professionals, professional software developers, software quality engineers, computer science students, security software vendors and others.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Process}}&lt;br /&gt;
If you would like to present at the BASC, please email an abstract of your presentation the program committee at TBD &amp;lt;!-- [mailto:basc-proposals@onestopappsecurity.com basc-proposals@onestopappsecurity.com] --&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
For further information, see the [[Speaker_Agreement |OWASP Speaker Agreement]] replacing dates in the agreement with the following dates.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Schedule}}&lt;br /&gt;
* September 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: Notifications about proposals will begin to be sent out.&lt;br /&gt;
* October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: The conference.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Call For Papers}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111919</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111919"/>
				<updated>2011-06-07T17:34:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111833</id>
		<title>2011 BASC Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111833"/>
				<updated>2011-06-06T14:28:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2010_BASC:Section_Template | Summary}}&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Summary}} --&amp;gt;&lt;br /&gt;
The [[Boston |  OWASP Boston chapter]] would like to announce a call for papers for the 2011 Boston Application Security Conference (BASC) on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)] in Cambridge MA. &lt;br /&gt;
&lt;br /&gt;
This will be a free, one day informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. You can find more information about the BASC on the its [[2011_BASC_Homepage |homepage]].&lt;br /&gt;
&lt;br /&gt;
The BASC will have two parallel tracks. Track 1 will focus on the basics of application security and the practical uses of application security tools and techniques. Track 2 will focus on more advanced application security topics including research on application security as well as . &lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes which should include any time for Q&amp;amp;A.&lt;br /&gt;
&lt;br /&gt;
We hope to attract people who are new to application security as well as thought leaders who are experienced in application security. We expect the attendees to include application security professionals, professional software developers, software quality engineers, computer science students, security software vendors and others.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Process}}&lt;br /&gt;
If you would like to present at the BASC, please email an abstract of your presentation the program committee at TBD &amp;lt;!-- [mailto:basc-proposals@onestopappsecurity.com basc-proposals@onestopappsecurity.com] --&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
For further information, see the [[Speaker_Agreement |OWASP Speaker Agreement]] replacing dates in the agreement with the following dates.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Schedule}}&lt;br /&gt;
* September 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: Notifications about proposals will begin to be sent out.&lt;br /&gt;
* October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: The conference.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Call For Papers}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111831</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111831"/>
				<updated>2011-06-06T13:39:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ==== &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111724</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111724"/>
				<updated>2011-06-04T03:31:35Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ====&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111723</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111723"/>
				<updated>2011-06-04T03:26:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ====&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meeting Notes  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111722</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111722"/>
				<updated>2011-06-04T03:25:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Welcome}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111721</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111721"/>
				<updated>2011-06-04T03:24:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]]&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111720</id>
		<title>2011 BASC Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111720"/>
				<updated>2011-06-04T03:24:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2010_BASC:Section_Template | Summary}}&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Summary}} --&amp;gt;&lt;br /&gt;
The [[Boston |  OWASP Boston chapter]] would like to announce a call for papers for the 2011 Boston Application Security Conference (BASC) on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)] in Cambridge MA. &lt;br /&gt;
&lt;br /&gt;
This will be a free, one day informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. You can find more information about the BASC on the its [[2011_BASC_Homepage |homepage]].&lt;br /&gt;
&lt;br /&gt;
The BASC will have two parallel tracks. Track 1 will focus on the basics of application security and the practical uses of application security tools and techniques. Track 2 will focus on more advanced application security topics including research on application security as well as . &lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes which should include any time for Q&amp;amp;A.&lt;br /&gt;
&lt;br /&gt;
We hope to attract people who are new to application security as well as thought leaders who are experienced in application security. We expect the attendees to include application security professionals, professional software developers, software quality engineers, computer science students, security software vendors and others.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Process}}&lt;br /&gt;
If you would like to present at the BASC, please email an abstract of your presentation the program committee at [mailto:basc-proposals@onestopappsecurity.com basc-proposals@onestopappsecurity.com].&lt;br /&gt;
&lt;br /&gt;
For further information, see the [[Speaker_Agreement |OWASP Speaker Agreement]] replacing dates in the agreement with the following dates.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Schedule}}&lt;br /&gt;
* September 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: Notifications about proposals will begin to be sent out.&lt;br /&gt;
* October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: The conference.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Footer_Template | Call For Papers}} --&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111719</id>
		<title>2011 BASC Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Call_For_Papers&amp;diff=111719"/>
				<updated>2011-06-04T03:24:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: Created page with &amp;quot;{{2010_BASC:Section_Template | Summary}} &amp;lt;!-- {{2010_BASC:Header_Template | Summary}} --&amp;gt; The   OWASP Boston chapter would like to announce a call for papers for the ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2010_BASC:Section_Template | Summary}}&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Summary}} --&amp;gt;&lt;br /&gt;
The [[Boston |  OWASP Boston chapter]] would like to announce a call for papers for the 2011 Boston Application Security Conference (BASC) on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)] in Cambridge MA. &lt;br /&gt;
&lt;br /&gt;
This will be a free, one day informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. You can find more information about the BASC on the its [[2011_BASC_Homepage |homepage]].&lt;br /&gt;
&lt;br /&gt;
The BASC will have two parallel tracks. Track 1 will focus on the basics of application security and the practical uses of application security tools and techniques. Track 2 will focus on more advanced application security topics including research on application security as well as . &lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes which should include any time for Q&amp;amp;A.&lt;br /&gt;
&lt;br /&gt;
We hope to attract people who are new to application security as well as thought leaders who are experienced in application security. We expect the attendees to include application security professionals, professional software developers, software quality engineers, computer science students, security software vendors and others.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Process}}&lt;br /&gt;
If you would like to present at the BASC, please email an abstract of your presentation the program committee at [mailto:basc-proposals@onestopappsecurity.com basc-proposals@onestopappsecurity.com].&lt;br /&gt;
&lt;br /&gt;
For further information, see the [[Speaker_Agreement |OWASP Speaker Agreement]] replacing dates in the agreement with the following dates.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Section_Template | Schedule}}&lt;br /&gt;
* September 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: Notifications about proposals will begin to be sent out.&lt;br /&gt;
* October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011: The conference.&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Footer_Template | Call For Papers}}&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111718</id>
		<title>2011 BASC Homepage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_BASC_Homepage&amp;diff=111718"/>
				<updated>2011-06-04T03:20:10Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: Created page with &amp;quot;right        &amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt; This is the homepage for the 2011 Boston Application Security Conference (BASC). T...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Boston-Banner-468x60.gif|right]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- {{2010_BASC:Header_Template | Welcome}} --&amp;gt;&lt;br /&gt;
This is the homepage for the 2011 Boston Application Security Conference (BASC). This free conference will take place on Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; at [http://microsoftcambridge.com/Default.aspx Microsoft New England Research and Development Center (NERD)].&lt;br /&gt;
&lt;br /&gt;
The BASC will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide-array of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors should be able to come to the BASC, learn, and hopefully enjoy themselves at the same time.&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | The Details}}&lt;br /&gt;
* Date: Saturday, October 29&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt;, 2011&lt;br /&gt;
* Time: 8:00 AM - 7:00 PM&lt;br /&gt;
* Location: [http://microsoftcambridge.com/Default.aspx NERD]&lt;br /&gt;
* Directions: [http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx NERD's website] or [http://maps.google.com/places/us/ma/cambridge/memorial-dr/1/-microsoft-new-england-research-and-development-center?hl=en&amp;amp;gl=us Google Maps]&lt;br /&gt;
* Registration: TBD  &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] --&amp;gt;&lt;br /&gt;
* Agenda: TBD &amp;lt;!-- [[2010_BASC_Agenda | Agenda]]  --&amp;gt;&lt;br /&gt;
* Speakers Details:  TBD &amp;lt;!-- [[2010_BASC_Speakers | Speakers]] --&amp;gt;&lt;br /&gt;
* Presentation Details: TBD &amp;lt;!-- [[2010_BASC_Presentations | Presentations]] --&amp;gt;&lt;br /&gt;
* Call for papers: [[2010_BASC_Call_For_Papers | 2010 BASC CALL FOR PAPERS]]&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Registration}}&lt;br /&gt;
Admission to the BASC is free but registration is required for breakfast, lunch, and the evening social time. We will do everything possible to accommodate late registrants but the facility and food are limited. &amp;lt;!-- [http://basc2010.eventbrite.com/ Online registration] is now open and you are encouraged to register early. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{2010 BASC:Section Template | Call For Papers}}&lt;br /&gt;
We are accepting presentation proposals. If you are interested in being a presenter at the 2011 BASC, you can read the complete [[2011_BASC_Call_For_Papers | 2011 BASC CALL FOR PAPERS]].&lt;br /&gt;
&lt;br /&gt;
{{2010_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111717</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111717"/>
				<updated>2011-06-04T03:15:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ====&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference 2010]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meeting Notes  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111716</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111716"/>
				<updated>2011-06-04T03:14:47Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2011 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Homepage|Boston Application Security Conference 2011]] &lt;br /&gt;
&lt;br /&gt;
[[2011 BASC Call For Papers|Boston Application Security Conference 2011 - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Past Conferences ====&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- [http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]  --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meeting Notes  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111715</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111715"/>
				<updated>2011-06-04T03:00:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2010 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Upcoming Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
==== Past Meeting Notes  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111318</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111318"/>
				<updated>2011-05-31T20:40:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. &lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2010 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Homepage|Boston Application Security Conference]] &lt;br /&gt;
&lt;br /&gt;
[[2010 BASC Call For Papers|Boston Application Security Conference - Call For Papers]] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference] &lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information --- Our Seventh Year ==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing address is: &lt;br /&gt;
&lt;br /&gt;
OWASP Boston 35 Wachusett Dr Lexington, MA. 02421 &lt;br /&gt;
&lt;br /&gt;
== Reviews  ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm. &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers. &lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups]. &lt;br /&gt;
&lt;br /&gt;
== Location  ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month ('''Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA. &lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C. &lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx &lt;br /&gt;
&lt;br /&gt;
'''Topic - Bringing Sexy Back: Defensive Measures That Actually Work''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Founder &amp;amp;amp; CEO, PaulDotCom Enterprises &lt;br /&gt;
&lt;br /&gt;
There is a plethora of information available on how to break into systems, steal information, and compromise users. As a penetration tester, I have performed testing on a regular basis that reveals severe security weaknesses in several organizations, and many of my peers have reported on the same. However, once you &amp;quot;own&amp;quot; the network and report on how you accomplished your goals, now what? Sure, we make defensive recommendations, but consistently it has been proven that security can be bypassed. Not enough focus is given to what works defensively. We have a lot of technology at our disposal: firewalls, intrusion detection, log correlation, but it provides little protection from today's threats and is often not implemented effectively. This talk will focus on taking an offensive look at defense. Applying techniques that are simple, yet break the mold of traditional defensive measures. We will explore setting up &amp;quot;traps&amp;quot; for attackers, slowing them down with simple scripts, using honeypots, planting bugs, and most importantly tying these methods to &amp;quot;enterprise security&amp;quot;. This talk will also include real-world examples of the techniques in action from a live, heavily attacked site. Topics will include: &lt;br /&gt;
&lt;br /&gt;
*Using wireless “attacks” on the attackers&lt;br /&gt;
*Implementing the Metasploit Decloak engine to find the attackers&lt;br /&gt;
*Setting traps to detect web application attacks&lt;br /&gt;
*Integrating results into your enterprise log management tool&lt;br /&gt;
&lt;br /&gt;
The goal of this talk is to make defense “sexy”… &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers. &lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA) &lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston &lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References. &lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing''' &lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth &lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information. &lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations. &lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio''' &lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years. &lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding''' -- CANCELLED &lt;br /&gt;
&lt;br /&gt;
Presenter - Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio ''' &lt;br /&gt;
&lt;br /&gt;
== Past Meeting Notes  ==&lt;br /&gt;
&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
&lt;br /&gt;
Ed Adams Security Innovation -- the new OWASP Exams Project and the work being done by the OWASP Academies Working Group &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
&lt;br /&gt;
Application Architecture Security Assessment - Second session &lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model &lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors Overview: In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp;amp; design review. This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist &lt;br /&gt;
&lt;br /&gt;
Joey Peloquin - Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection &lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad Security Innovation Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications. &lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies &lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic &lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners &lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield, Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com &lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document] &lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot &lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security. Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware. &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
&lt;br /&gt;
Brian Holyfield, Gothem Digital Science &lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications http://www.gdssecurity.com/l/b/2008/12/04/ &lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk &lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode &lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications &lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation] &lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software development life cycle. This presentation will cover how to bring practicality into secure software development. Several integration models will be explored as well as solutions for potential obstacles &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer EMC; CISSP &lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot; &lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
&lt;br /&gt;
Tool Talk - Jim Weiler - WebGoat and Crosssite Request Forgeries &lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
&lt;br /&gt;
Jeremiah Grossman, CTO Whitehat Security: Top 10 Web Application Hacks of 2006 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
&lt;br /&gt;
Dave Low, RSA the Security Division of EMC: encryption case studies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
&lt;br /&gt;
Mike Gavin, Forrester Research: Web Application Firewalls &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention &lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking &lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1. first meeting with all demos, no powerpoints! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy [http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks] &lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic Web Application Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO Database Security: Protecting Identity Information at the Source &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA Practical Encryption &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher [http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant [http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp Chaiman of the OASIS Security Services (SAML) Technical Committee - [http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation&amp;amp;nbsp;: Prospects and Challenges] &lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum - Application Security Gateways &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation - How to Break Software Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel - [http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security] &lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security [http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers] &lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft Let's talk about Application Security &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler] 781 356 0067 &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold &lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Boston]] [[Category:OWASP_Chapter]] [[Category:Massachusetts]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=111201</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=111201"/>
				<updated>2011-05-29T13:02:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list].&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2010 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Homepage | Boston Application Security Conference]]&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Call_For_Papers | Boston Application Security Conference - Call For Papers]]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ---   Our Seventh Year==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing  address is:&lt;br /&gt;
&lt;br /&gt;
OWASP Boston&lt;br /&gt;
35 Wachusett Dr&lt;br /&gt;
Lexington, MA. 02421&lt;br /&gt;
&lt;br /&gt;
== Reviews ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.[[Category:Boston]]&lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups].&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month (''' Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA.&lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C.&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Thursday June 2'''&lt;br /&gt;
&lt;br /&gt;
Location - '''Microsoft NERD''' - http://microsoftcambridge.com/About/Directions/tabid/89/Default.aspx&lt;br /&gt;
&lt;br /&gt;
'''Topic - TBD'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Paul Asadoorian, Product Evangelist, Tenable Network Security&lt;br /&gt;
 &lt;br /&gt;
'''Presenter Bio'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian is currently the &amp;quot;Product Evangelist&amp;quot; for Tenable Network Security, where he showcases vulnerability scanning and management through blogs, podcasts and videos. Paul is also the founder of PaulDotCom, an organization centered around the award winning &amp;quot;PaulDotCom Security Weekly&amp;quot; podcast that brings listeners the latest in security news, vulnerabilities, research and interviews with the security industry's finest. Paul has a background in penetration testing, intrusion detection, and is the co-author of &amp;quot;WRT54G Ultimate Hacking&amp;quot;, a book dedicated to hacking Linksys routers.&lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)&lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References.&lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth&lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information.&lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio'''&lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years.&lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding'''  -- CANCELLED&lt;br /&gt;
&lt;br /&gt;
Presenter  - Josh Abraham,  Rapid 7&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio '''&lt;br /&gt;
&lt;br /&gt;
== Past Meeting Notes ==&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
Ed Adams  Security Innovation  --  the new OWASP Exams Project and the work being done by the OWASP Academies Working Group&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
Josh Abraham, Rapid 7  &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
Application Architecture Security Assessment - Second session&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model&lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
Overview:&lt;br /&gt;
In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp; design review. &lt;br /&gt;
This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors&lt;br /&gt;
In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin -  Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced&lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett&lt;br /&gt;
The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. &lt;br /&gt;
Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection&lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad  Security Innovation &lt;br /&gt;
Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications.&lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html&lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies&lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic&lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners&lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield,  Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com&lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly  [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document]&lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot&lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security.  Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware.  &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
Brian Holyfield, Gothem Digital Science&lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications  http://www.gdssecurity.com/l/b/2008/12/04/&lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk&lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode&lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications&lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation]&lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software&lt;br /&gt;
development life cycle. This presentation will cover how to bring practicality into secure software &lt;br /&gt;
development. Several integration models will be explored as well as solutions for potential obstacles&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer  EMC; CISSP&lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
Tool Talk - Jim Weiler -  WebGoat and Crosssite Request Forgeries&lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
Jeremiah Grossman,   CTO Whitehat Security:   Top 10 Web Application Hacks of 2006&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
Dave Low,  RSA the Security Division of EMC:   encryption case studies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
Mike Gavin, Forrester Research:    Web Application Firewalls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention&lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking&lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1.&lt;br /&gt;
first meeting with all demos, no powerpoints!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy&lt;br /&gt;
[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks]&lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic&lt;br /&gt;
Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO&lt;br /&gt;
Database Security: Protecting Identity Information at the Source&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA&lt;br /&gt;
Practical Encryption&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp&lt;br /&gt;
Chaiman of the OASIS Security Services (SAML) Technical Committee -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation : Prospects and Challenges]&lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum -&lt;br /&gt;
Application Security Gateways&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation -&lt;br /&gt;
How to Break Software Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security]&lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security&lt;br /&gt;
[http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers]&lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft&lt;br /&gt;
Let's talk about Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler]  781 356 0067   &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold&lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Massachusetts]]&lt;br /&gt;
[[Category:Boston]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=110771</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=110771"/>
				<updated>2011-05-19T14:52:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list].&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2010 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Homepage | Boston Application Security Conference]]&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Call_For_Papers | Boston Application Security Conference - Call For Papers]]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ---   Our Seventh Year==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing  address is:&lt;br /&gt;
&lt;br /&gt;
OWASP Boston&lt;br /&gt;
35 Wachusett Dr&lt;br /&gt;
Lexington, MA. 02421&lt;br /&gt;
&lt;br /&gt;
== Reviews ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.[[Category:Boston]]&lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups].&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month (''' Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA.&lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C.&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)&lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References.&lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth&lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information.&lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio'''&lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years.&lt;br /&gt;
&lt;br /&gt;
 ''' CANCELLED   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding'''  -- CANCELLED&lt;br /&gt;
&lt;br /&gt;
Presenter  - Josh Abraham,  Rapid 7&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio '''&lt;br /&gt;
&lt;br /&gt;
== Past Meeting Notes ==&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
Ed Adams  Security Innovation  --  the new OWASP Exams Project and the work being done by the OWASP Academies Working Group&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
Josh Abraham, Rapid 7  &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
Application Architecture Security Assessment - Second session&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model&lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
Overview:&lt;br /&gt;
In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp; design review. &lt;br /&gt;
This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors&lt;br /&gt;
In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin -  Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced&lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett&lt;br /&gt;
The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. &lt;br /&gt;
Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection&lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad  Security Innovation &lt;br /&gt;
Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications.&lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html&lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies&lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic&lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners&lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield,  Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com&lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly  [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document]&lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot&lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security.  Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware.  &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
Brian Holyfield, Gothem Digital Science&lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications  http://www.gdssecurity.com/l/b/2008/12/04/&lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk&lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode&lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications&lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation]&lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software&lt;br /&gt;
development life cycle. This presentation will cover how to bring practicality into secure software &lt;br /&gt;
development. Several integration models will be explored as well as solutions for potential obstacles&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer  EMC; CISSP&lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
Tool Talk - Jim Weiler -  WebGoat and Crosssite Request Forgeries&lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
Jeremiah Grossman,   CTO Whitehat Security:   Top 10 Web Application Hacks of 2006&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
Dave Low,  RSA the Security Division of EMC:   encryption case studies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
Mike Gavin, Forrester Research:    Web Application Firewalls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention&lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking&lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1.&lt;br /&gt;
first meeting with all demos, no powerpoints!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy&lt;br /&gt;
[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks]&lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic&lt;br /&gt;
Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO&lt;br /&gt;
Database Security: Protecting Identity Information at the Source&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA&lt;br /&gt;
Practical Encryption&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp&lt;br /&gt;
Chaiman of the OASIS Security Services (SAML) Technical Committee -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation : Prospects and Challenges]&lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum -&lt;br /&gt;
Application Security Gateways&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation -&lt;br /&gt;
How to Break Software Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security]&lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security&lt;br /&gt;
[http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers]&lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft&lt;br /&gt;
Let's talk about Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler]  781 356 0067   &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold&lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Massachusetts]]&lt;br /&gt;
[[Category:Boston]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boston&amp;diff=110769</id>
		<title>Boston</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boston&amp;diff=110769"/>
				<updated>2011-05-19T14:51:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bernie K Wong: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boston|extra=The chapter leader is [mailto:jim.weiler@owasp.org Jim Weiler]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Boston|emailarchives=http://lists.owasp.org/pipermail/owasp-Boston}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boston&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To find out more about the Boston chapter, just join the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list].&lt;br /&gt;
&lt;br /&gt;
== Boston Application Security Conference 2010 --- FREE  ==&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Homepage | Boston Application Security Conference]]&lt;br /&gt;
&lt;br /&gt;
[[2010_BASC_Call_For_Papers | Boston Application Security Conference - Call For Papers]]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/2010_BASC_Homepage Listing Of All Pages Related To The Boston Application Security Conference]&lt;br /&gt;
&lt;br /&gt;
== Local Chapter Information ---   Our Seventh Year==&lt;br /&gt;
&lt;br /&gt;
The chapter shipping/mailing  address is:&lt;br /&gt;
&lt;br /&gt;
OWASP Boston&lt;br /&gt;
35 Wachusett Dr&lt;br /&gt;
Lexington, MA. 02421&lt;br /&gt;
&lt;br /&gt;
== Reviews ==&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Reviews_of_security_podcasts Reviews of security podcasts]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
We usually meet the FIRST WEDNESDAY of EVERY MONTH (Unless a speaker can only present another night), 6:30 to 9 pm.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to come to any meeting, there is no signup or joining criteria, just come if it sounds interesting. Feel free to sign up to the [http://lists.owasp.org/mailman/listinfo/owasp-boston OWASP Boston mailing list]. This list is very low volume (2 - 3 emails/month); it is used to remind people about each monthly meeting, inform about local application security events and special chapter offers.[[Category:Boston]]&lt;br /&gt;
&lt;br /&gt;
Information for meeting updates about this and other Boston area user groups can also be found at [http://bug.bostonusergroups.org/Lists/Groups%20Calendar/calendar.aspx BostonUserGroups].&lt;br /&gt;
&lt;br /&gt;
== Location ==&lt;br /&gt;
&lt;br /&gt;
The Boston OWASP Chapter meets the FIRST WEDNESDAY of every month (''' Unless a speaker can only present another night'''), 6:30 pm at the Microsoft offices at the Waltham Weston Corporate Center, 201 Jones Rd., Sixth Floor Waltham, MA.&lt;br /&gt;
&lt;br /&gt;
From Rt. 128 North take exit 26 toward Waltham, East up the hill on Rt. 20. From Rt 128 South take exit 26 but go around the rotary to get to 20 East to Waltham. Follow signs for Rt. 117 (left at the second light). When you get to 117 turn left (West). You will cross back over Rt. 128. Jones Rd. (look for the Waltham Weston Corporate Center sign) is the second left, at a blinking yellow light, on Rt. 117 going west about 0.1 miles from Rt. 128 (I95). The office building is at the bottom of Jones Rd. Best parking is to turn right just before the building and park in the back. Knock on the door to get the security guard to open it. The room is MPR C.&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings  ==&lt;br /&gt;
&lt;br /&gt;
 '''Thursday May 26'''&lt;br /&gt;
&lt;br /&gt;
Location - Microsoft Waltham (201 Jones Rd., Sixth Floor Waltham, MA)&lt;br /&gt;
&lt;br /&gt;
'''Topic - OWASP Top 10 issue #4 – Insecure Direct Object Reference'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels and President of OWASP Boston&lt;br /&gt;
&lt;br /&gt;
Jim Weiler will discuss threat models, risks and various remediations of issue #4 in the 2010 OWASP Top 10 – Insecure Direct Object References.&lt;br /&gt;
&lt;br /&gt;
'''Topic - A Web-Application Architecture for Regulatory Compliant Cloud Computing'''&lt;br /&gt;
&lt;br /&gt;
Presenter - Arshad Noor, StrongAuth&lt;br /&gt;
&lt;br /&gt;
The emergence of cloud-computing as an alternative deployment strategy for IT systems presents many opportunities, yet challenges traditional notions of data-security. The fact that data-security regulations are developing teeth, leaves information technology professionals perplexed on how to take advantage of cloud-computing while proving compliance to regulations for protecting sensitive information.&lt;br /&gt;
&lt;br /&gt;
This presentation presents an architecture for building the next generation of web-applications. This architecture allows you to leverage emerging technologies such as cloud-computing, cloud-storage and enterprise key-management (EKM) to derive benefits such as lower costs, faster time-to-market and immense scalability with smaller investments - while proving compliance to PCI-DSS, HIPAA/HITECH and similar data-security regulations.&lt;br /&gt;
&lt;br /&gt;
'''Presenter Bio'''&lt;br /&gt;
&lt;br /&gt;
Arshad Noor is the CTO of StrongAuth, Inc, a Silicon Vally-based company that specializes in enterprise key management. He is the designer and lead-developer of StrongKey, the industry's first open-source Symmetric Key Management System, and the KeyAppliance - the industry's first appliance combining encryption, tokenization, key-management and a cryptographic hardware module at an unprecedented value. He has written many papers and spoken at many forums on the subject of encryption and key-management over the years.&lt;br /&gt;
&lt;br /&gt;
 ''' POSTPONED. Date and Venue TBD   ''' &lt;br /&gt;
&lt;br /&gt;
'''Topic – Secure Application design and Coding'''  -- CANCELLED&lt;br /&gt;
&lt;br /&gt;
Presenter  - Josh Abraham,  Rapid 7&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio '''&lt;br /&gt;
&lt;br /&gt;
== Past Meeting Notes ==&lt;br /&gt;
 '''April 2011'''&lt;br /&gt;
Ed Adams  Security Innovation  --  the new OWASP Exams Project and the work being done by the OWASP Academies Working Group&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2011'''&lt;br /&gt;
Josh Abraham, Rapid 7  &lt;br /&gt;
&lt;br /&gt;
Owning the world, one mobile app at a time, and web services pen testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Febrary 2011'''&lt;br /&gt;
Rob Cheyne, CEO of Safelight Security - &lt;br /&gt;
&lt;br /&gt;
Security Leadership series: Delivering a successful security presentation&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2010'''&lt;br /&gt;
Application Architecture Security Assessment - Second session&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2010'''&lt;br /&gt;
Open SAMM – Software Assurance Maturity Model&lt;br /&gt;
&lt;br /&gt;
Shakeel Tufail is the Federal Practice Manager at Fortify, an HP company.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2010'''&lt;br /&gt;
Rob Cheyne, CEO SafeLight Security Advisors&lt;br /&gt;
Overview:&lt;br /&gt;
In this highly interactive two-part workshop, Rob Cheyne of Safelight Security will show you the basics of conducting a real-world architecture &amp;amp; design review. &lt;br /&gt;
This workshop draws from Safelight's Security Architecture Fundamentals training course, a two-day course frequently used to teach Fortune 500 companies how to look at their system architectures from both the hacker's and the designer’s point of view. &lt;br /&gt;
&lt;br /&gt;
 '''July 2010'''&lt;br /&gt;
Lightning Talk – Rob Cheyne, CEO Safelight Security Advisors&lt;br /&gt;
In this installment of the Safelight lightning talks series, Rob will present the basics of a Cross-site Request Forgery (CSRF). &lt;br /&gt;
&lt;br /&gt;
Main Presentation - Drive-by Pharming with MonkeyFist&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin -  Director of Application Security, Fishnet Security &lt;br /&gt;
&lt;br /&gt;
 '''June 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - topic to be announced&lt;br /&gt;
&lt;br /&gt;
Main Presentation - Ryan Barnett&lt;br /&gt;
The Web Hacking Incident Database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. &lt;br /&gt;
Ryan Barnett is director of application security research at Breach Security where he leads Breach Security Labs. &lt;br /&gt;
&lt;br /&gt;
 '''May 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne Lightning Talk - SQL Injection&lt;br /&gt;
&lt;br /&gt;
Vinnie Liu - Data Exposure, New Approaches to Open Source Intelligence Techniques, and Incident Handling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2010'''&lt;br /&gt;
&lt;br /&gt;
Dan Hestad  Security Innovation &lt;br /&gt;
Dan will be talking about his experiences with PCI and web applications, and answering questions about do's and don'ts of acceptable PCI practices in web applications.&lt;br /&gt;
&lt;br /&gt;
 '''March 2010'''&lt;br /&gt;
&lt;br /&gt;
Zack Lanier - Disclosure Samsara, or &amp;quot;the endless vulnerability disclosure debate&amp;quot; &lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.html&lt;br /&gt;
&lt;br /&gt;
http://n0where.org/talks/samsara_20100310.pdf (very large PDF)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2010'''&lt;br /&gt;
&lt;br /&gt;
Rob Cheyne of Safelight Security Advisors; New Technology, Same Old Vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2010 at Microsoft NERD, Cambridge'''&lt;br /&gt;
&lt;br /&gt;
Josh Abraham, Rapid 7 Technologies&lt;br /&gt;
&lt;br /&gt;
 '''December 2009'''&lt;br /&gt;
&lt;br /&gt;
Eric Bender, Cenzic&lt;br /&gt;
&lt;br /&gt;
 '''November 2009'''&lt;br /&gt;
&lt;br /&gt;
Jim Weiler, Sr. Mgr. Information Security, Starwood Hotels - Web Application Vulnerability Scanners&lt;br /&gt;
&lt;br /&gt;
Mush Hakhinian, Leader, Application Security Practice, IntraLinks - Secure coding with no money down using SONAR: unleashing the power of open-source code analysis tools &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2009'''&lt;br /&gt;
&lt;br /&gt;
Paul Schofield,  Senior Security Engineer, Imperva - From Rivals to BFF: WAF &amp;amp; VA Unite &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2009 at CORE Technologies, Boston'''&lt;br /&gt;
&lt;br /&gt;
Paul Asadoorian, Pauldotcom.com&lt;br /&gt;
&lt;br /&gt;
Alex Horan, CORE Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2009'''&lt;br /&gt;
&lt;br /&gt;
Joey Peloquin, Fishnet Security, Secure SDLC: The Good, the Bad and the Ugly  [http://www.owasp.org/images/4/48/SecureSDLC-GoodBadUgly.pdf presentation pdf]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2009'''&lt;br /&gt;
&lt;br /&gt;
Sabha Kazerooni, Security Compass - Exploit Me tools; Framework Level Threat Analysis&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/5a/Security_Compass_Exploilt_Me.pdf ExploitMe Document]&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/e/ef/Security_Compass_Framework-level_Threat_Analysis.pdf Framework Level Threat Analysis document]&lt;br /&gt;
&lt;br /&gt;
Meeting Pizza Sponsor - Arcot&lt;br /&gt;
&lt;br /&gt;
Arcot is a leader in online fraud prevention, strong authentication and eDocument security.  Arcot's solutions are easily deployed, low-cost and extremely scalable, allowing organizations to transparently protect their users from fraud without changing user behavior or requiring expensive hardware.  &lt;br /&gt;
&lt;br /&gt;
Arcot can be contacted thru Michael Kreppein, michael.kreppein@arcot.com, 617-467-5200 &lt;br /&gt;
&lt;br /&gt;
 '''December 2008'''&lt;br /&gt;
Brian Holyfield, Gothem Digital Science&lt;br /&gt;
&lt;br /&gt;
Tamper Proofing Web Applications  http://www.gdssecurity.com/l/b/2008/12/04/&lt;br /&gt;
&lt;br /&gt;
 '''June 2008'''&lt;br /&gt;
Jeremiah Grossman; Founder and CTO, Whitehat Security &lt;br /&gt;
&lt;br /&gt;
Appetizer - Hacking Intranets from the Outside (Just when you thought your network was safe) Port scanning with JavaScript &lt;br /&gt;
&lt;br /&gt;
Main Topic - Business Logic Flaws: How they put your Websites at Risk&lt;br /&gt;
&lt;br /&gt;
 '''March 2008'''&lt;br /&gt;
Chris Eng; Senior Director, Security Research, Veracode&lt;br /&gt;
&lt;br /&gt;
Description – Attacking crypto in web applications&lt;br /&gt;
&lt;br /&gt;
 '''December 2007'''&lt;br /&gt;
Scott Matsumoto; Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
Description – You Say Tomayto and I Say Tomahto – Talking to Developers about Application Security &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/5/5b/BostonOWASP200712-Cigital.pdf Cigital Presentation]&lt;br /&gt;
&lt;br /&gt;
 '''November 2007'''&lt;br /&gt;
Tom Mulvehill Ounce Labs &lt;br /&gt;
&lt;br /&gt;
Description – Tom will share his knowledge and expertise on implementing security into the software&lt;br /&gt;
development life cycle. This presentation will cover how to bring practicality into secure software &lt;br /&gt;
development. Several integration models will be explored as well as solutions for potential obstacles&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/images/f/f8/Ounce_OWASP_07NOV07ppt.zip Ounce presentation]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2007'''&lt;br /&gt;
&lt;br /&gt;
George Johnson, Principal Software Engineer  EMC; CISSP&lt;br /&gt;
&lt;br /&gt;
An Introduction to Threat Modeling. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2007'''&lt;br /&gt;
&lt;br /&gt;
Day of Worldwide OWASP 1 day conferences on the topic &amp;quot;Privacy in the 21st Century&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 '''June 2007'''&lt;br /&gt;
Tool Talk - Jim Weiler -  WebGoat and Crosssite Request Forgeries&lt;br /&gt;
&lt;br /&gt;
Danny Allan; Director, Security Research, Watchfire &lt;br /&gt;
&lt;br /&gt;
Topic: Exploitation of the OWASP Top 10: Attacks and Strategies &lt;br /&gt;
&lt;br /&gt;
 '''March 2007'''&lt;br /&gt;
Jeremiah Grossman,   CTO Whitehat Security:   Top 10 Web Application Hacks of 2006&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2007'''&lt;br /&gt;
Dave Low,  RSA the Security Division of EMC:   encryption case studies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2006'''&lt;br /&gt;
Mike Gavin, Forrester Research:    Web Application Firewalls&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''June 2006'''&lt;br /&gt;
Imperva - Application and Database Vulnerabilities and Intrusion Prevention&lt;br /&gt;
&lt;br /&gt;
Jim Weiler - Using Paros Proxy Server as a Web Application Vulnerability tool &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2006'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2006'''&lt;br /&gt;
&lt;br /&gt;
Dennis Hurst; SPI Dynamics: A study of AJAX Hacking&lt;br /&gt;
&lt;br /&gt;
Jim Weiler; OWASP Boston: Using Paros HTTP proxy, part 1.&lt;br /&gt;
first meeting with all demos, no powerpoints!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2006'''&lt;br /&gt;
&lt;br /&gt;
Mateo Meucci; OWASP Italy&lt;br /&gt;
[http://www.owasp.org/images/8/8c/Anatomy_of_2_Web_App_Testing.zip Anatomy of 2 web attacks]&lt;br /&gt;
&lt;br /&gt;
Tom Stracener; Cenzic&lt;br /&gt;
Web Application Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''February 2006'''&lt;br /&gt;
&lt;br /&gt;
Ron Ben Natan; Guardium CTO&lt;br /&gt;
Database Security: Protecting Identity Information at the Source&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''January 2006'''&lt;br /&gt;
&lt;br /&gt;
David Low, Senior Field Engineer: RSA&lt;br /&gt;
Practical Encryption&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''December 2005'''&lt;br /&gt;
&lt;br /&gt;
Paul Galwas, Product Manager: nCipher&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP051207.ppt Enigma variations: Key Management controlled]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''November 2005'''&lt;br /&gt;
&lt;br /&gt;
Robert Hurlbut, Independent Consultant&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/OWASP_Hurlbut_ThreatModelingforWebApplicaitons.zip Threat Modeling for web applications]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''October 2005'''&lt;br /&gt;
&lt;br /&gt;
Prateek Mishra, Ph.D. Director, Security Standards and Strategy: Oracle Corp&lt;br /&gt;
Chaiman of the OASIS Security Services (SAML) Technical Committee -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/Federation-Introduction-Overview-01.ppt Identity Federation : Prospects and Challenges]&lt;br /&gt;
&lt;br /&gt;
Ryan Shorter, Sr. System Engineer: Netcontinuum -&lt;br /&gt;
Application Security Gateways&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''September 2005'''&lt;br /&gt;
&lt;br /&gt;
Dr. Herbert Thompson, Chief Security Strategist: SecurityInnovation -&lt;br /&gt;
How to Break Software Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''July 2005'''&lt;br /&gt;
&lt;br /&gt;
Mark O'Neill, CTO: Vordel -&lt;br /&gt;
[http://www.owasp.org/docroot/owasp/misc/MarkOneill.pdf Giving SOAP a REST? A look at the intersection of Web Application Security and Web Services Security]&lt;br /&gt;
&lt;br /&gt;
 '''June 2005'''&lt;br /&gt;
&lt;br /&gt;
Arian Evans, National Practice Lead, Senior Security Engineer: Fishnet Security&lt;br /&gt;
[http://www.owasp.org/conferences/appsec2005dc/schedule.html Overview of Application Security Tools]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''May 2005'''&lt;br /&gt;
&lt;br /&gt;
Patrick Hynds, CTO: Critical Sites - [http://www.owasp.org/docroot/owasp/misc/Passwords-Keys_to_the_Kingdom_Dev_V1.ppt Passwords - Keys to the Kingdom]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''April 2005'''&lt;br /&gt;
&lt;br /&gt;
Jonathan Levin - [http://www.owasp.org/docroot/owasp/misc/JLevinRandoms.pdf Of Random Numbers]&lt;br /&gt;
&lt;br /&gt;
Jothy Rosenberg, Founder and CTO: Service Integrity - [http://www.owasp.org/docroot/owasp/misc/JothyRWebSvcsSec.ppt Web Services Security]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''March 2005'''&lt;br /&gt;
&lt;br /&gt;
Joe Stagner: Microsoft&lt;br /&gt;
Let's talk about Application Security&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 '''Feb 2005'''&lt;br /&gt;
&lt;br /&gt;
Application Security Inc. PowerPoint slides for the [http://www.owasp.org/docroot/owasp/misc/Anatomy+of+an+Attack.ppt Anatomy of a Database Attack.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Boston OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''President''' &lt;br /&gt;
&lt;br /&gt;
- [mailto:jim.weiler@owasp.org Jim Weiler]  781 356 0067   &lt;br /&gt;
&lt;br /&gt;
'''Program Committee''' &lt;br /&gt;
&lt;br /&gt;
- Mark Arnold&lt;br /&gt;
&lt;br /&gt;
'''Communications Director''' &lt;br /&gt;
&lt;br /&gt;
- Yolanda Liu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Massachusetts]]&lt;br /&gt;
[[Category:Boston]]&lt;/div&gt;</summary>
		<author><name>Bernie K Wong</name></author>	</entry>

	</feed>