<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jm04469</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jm04469"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jm04469"/>
		<updated>2026-05-03T19:01:56Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=227965</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=227965"/>
				<updated>2017-03-27T20:05:20Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: UConn&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:jmcgovern@massmutual.com James McGovern] and [mailto:alvin.fong@owasp.org Alvin Fong]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Risk Rating Methodologies&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Internet of Things (IOT) Security&lt;br /&gt;
* Information Security 101 for Business Executives&lt;br /&gt;
* Enterprise Risk Management - Understanding true risks&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
Outlook events:&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, Mar 29th 2017'''&amp;lt;br&amp;gt;&lt;br /&gt;
6:30PM - 9PM&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP UCONN &amp;lt;br&amp;gt;&lt;br /&gt;
https://cc.callinfo.com/r/1jtu5l8injwjx&amp;amp;eom&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The next OWASP Hartford chapter meeting will be held at the ITE Building Room 301 on the University of Connecticut Campus in Storrs. We are conducting an interactive session with students of the cybersecurity club and will be inviting participation from students attending Law, Business and Medical schools for an enlightening discussion on Healthcare Information Security. As usual, this event is kid-friendly and OWASP-approved with a healthy dose of FREE TO ATTEND sprinkled on top.&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, Sep 29th 2016'''&amp;lt;br&amp;gt;&lt;br /&gt;
2PM - 4PM&amp;lt;br&amp;gt;&lt;br /&gt;
Fraud Analytics &amp;lt;br&amp;gt;&lt;br /&gt;
https://cc.callinfo.com/r/1jtu5l8injwjx&amp;amp;eom&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The next OWASP Hartford chapter meeting will focus on Fraud Analytics. James Ruotolo from SAS will be joining us to discuss fraud analytics methodologies, fraud patterns in insurance. There will also be a walkthrough of Visualization technologies, Risk Scoring, and Cybersecurity. &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Agenda: &amp;lt;br /&amp;gt;&lt;br /&gt;
Exploring Fraud Analytics &amp;lt;br /&amp;gt;&lt;br /&gt;
1.       Introduction &amp;lt;br /&amp;gt;&lt;br /&gt;
a.       Business analytics &amp;lt;br /&amp;gt;&lt;br /&gt;
b.      Example fraud analytics use cases &amp;lt;br /&amp;gt;&lt;br /&gt;
2.       Fraud analytics methodology&amp;lt;br /&amp;gt;&lt;br /&gt;
a.       Detection techniques&amp;lt;br /&amp;gt;&lt;br /&gt;
b.      Data management considerations&amp;lt;br /&amp;gt;&lt;br /&gt;
c.       Deployment and operationalization &amp;lt;br /&amp;gt;&lt;br /&gt;
3.       Case study: Fraud analytics in insurance&amp;lt;br /&amp;gt;&lt;br /&gt;
a.       Visualization technology &amp;lt;br /&amp;gt;&lt;br /&gt;
b.      Fraud risk scoring and alert triage &amp;lt;br /&amp;gt;&lt;br /&gt;
c.       Cybersecurity&amp;lt;br /&amp;gt;&lt;br /&gt;
d.      Example results&amp;lt;br /&amp;gt;&lt;br /&gt;
4.       Q&amp;amp;A&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
About James Ruotolo:&amp;lt;br /&amp;gt;&lt;br /&gt;
James Ruotolo is the product line leader for the fraud and security intelligence solution portfolio at SAS®. He is responsible for product management and marketing of fraud detection and compliance solutions for the banking, insurance, healthcare and government industries. Before joining SAS®, James was the Director of Strategic Operations for the special investigation unit of a large multi-line US insurance company where he was responsible for investigative analytics and intelligence operations. He has nearly two decades of investigation and fraud analytics experience. Connect with him on Twitter @jdruotolo &amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
Please RSVP by 9/28 on our meet-up site: https://www.meetup.com/Hartford-Cyber-Security-Meetup-OWASP/events/234147585/ OR register remotely via https://cc.callinfo.com/r/1jtu5l8injwjx&amp;amp;eom&amp;lt;/strong&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
GPS Address: 45 Central Row, Hartford, CT, 06103 (entrance is between Dunkin Donuts and CVS Pharmacy) &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Travelers Central Row Meeting rooms: &amp;lt;br /&amp;gt;https://www.travelers.com/about-us/careers/documents/hartfordmapdrivingdirections.pdf &amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Local parking map: http://parking.hartford.gov/map/map2009.htm &amp;lt;br /&amp;gt;&lt;br /&gt;
Note: there is limited street parking and the constitution plaza and financial plaza garages are the closest to the central row meeting rooms.&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, May 26th 2016'''&amp;lt;br&amp;gt;&lt;br /&gt;
Industry Cyber Security Panel &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Bemis – Travelers - Director of Application Security and Public Key Infrastructure&amp;lt;br&amp;gt;&lt;br /&gt;
Brian’s area of focus includes Application security, penetration testing, network security, Secure SDLC, and certificates &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Brian Heemsoth – Aetna – Director of Software and Mobile Security&amp;lt;br&amp;gt;		&lt;br /&gt;
Brian Heemsoth is responsible for designing and implementing security solutions with a user experience focus, &amp;lt;br&amp;gt;application security, mobile security and incident response. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Joe Niquette – UnitedHealth Group – Security Solutions Architect&amp;lt;br&amp;gt;&lt;br /&gt;
Joe’s involved in security research and development and passionate about rugged DevOps.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ankur Singhal – the Hartford – Manager Application Security	&amp;lt;br&amp;gt;&lt;br /&gt;
Ankur’s focus is web and mobile application security, security vulnerability management and remediation, Secure SDLC, PKI and cert management, Encryption at rest and most recently Security in DevOps&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
2:00 PM to 4:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 9th 2016'''&amp;lt;br&amp;gt;&lt;br /&gt;
Threat Modeling for Architects, Business Analysts and Quality Assurance Professionals’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Robert Hurlbut&amp;lt;br&amp;gt;&lt;br /&gt;
Independent software security consultant, architect and trainer&amp;lt;br&amp;gt;&lt;br /&gt;
Hurlbut Consulting Services&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Future Direction of Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:30 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.travelers.com/ Travelers Insurance] 45 Central Row, Hartford CT 06103 (Entrance is between Dunkin Donuts and CVS pharmacy). Free parking is available in their Propspect Street Garage (Next to Hartford Club).&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208310</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208310"/>
				<updated>2016-02-08T19:47:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Risk Rating Methodologies&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Internet of Things (IOT) Security&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, February 9th 2016'''&amp;lt;br&amp;gt;&lt;br /&gt;
Threat Modeling for Architects, Business Analysts and Quality Assurance Professionals’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Robert Hurlbut&amp;lt;br&amp;gt;&lt;br /&gt;
Independent software security consultant, architect and trainer&amp;lt;br&amp;gt;&lt;br /&gt;
Hurlbut Consulting Services&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Future Direction of Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:30 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.travelers.com/ Travelers Insurance] 45 Central Row, Hartford CT 06103 (Entrance is between Dunkin Donuts and CVS pharmacy). Free parking is available in their Propspect Street Garage (Next to Hartford Club).&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208308</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208308"/>
				<updated>2016-02-08T19:46:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Risk Rating Methodologies&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Internet of Things (IOT) Security&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, February 9th 2016'''&amp;lt;br&amp;gt;&lt;br /&gt;
Threat Modeling for Architects, Business Analysts and Quality Assurance Professionals’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Robert Hurlbut&amp;lt;br&amp;gt;&lt;br /&gt;
Independent software security consultant, architect and trainer&amp;lt;br&amp;gt;&lt;br /&gt;
Hurlbut Consulting Services&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Future Direction of Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:30 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.travelers.com/ Travelers Insurance] 45 Central Row, Hartford CT 06103 (Entrance is between Dunkin Donuts and CVS pharmacy). Free parking is available in their Propspect Street Garage (Next to Hartford Club).&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208015</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208015"/>
				<updated>2016-02-02T19:12:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Locations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Risk Rating Methodologies&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Internet of Things (IOT) Security&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.travelers.com/ Travelers Insurance] 45 Central Row, Hartford CT 06103 (Entrance is between Dunkin Donuts and CVS pharmacy). Free parking is available in their Propspect Street Garage (Next to Hartford Club).&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208012</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208012"/>
				<updated>2016-02-02T19:08:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Call for Sponsors/Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Risk Rating Methodologies&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Internet of Things (IOT) Security&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208011</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208011"/>
				<updated>2016-02-02T19:07:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers Insurance]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208010</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=208010"/>
				<updated>2016-02-02T19:06:44Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.travelers.com/ Travelers]for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@owasp.org James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=200084</id>
		<title>Forgot Password Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Forgot_Password_Cheat_Sheet&amp;diff=200084"/>
				<updated>2015-09-04T23:03:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article provides a simple model to follow when implementing a &amp;amp;quot;forgot password&amp;amp;quot; web application feature.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
= The Problem =&lt;br /&gt;
&lt;br /&gt;
There is no industry standard for implementing a Forgot Password feature. The result is that you see applications forcing users to jump through myriad hoops involving emails, special URLs, temporary passwords, personal security questions, and so on. With some applications you can recover your existing password. In others you have to reset it to a new value.&lt;br /&gt;
&lt;br /&gt;
= Steps  =&lt;br /&gt;
&lt;br /&gt;
== Step 1) Gather Identity Data or Security Questions ==&lt;br /&gt;
&lt;br /&gt;
The first page of a secure Forgot Password feature asks the user for multiple pieces of hard data that should have been previously collected (generally when the user first registers). Steps for this are detailed in the identity section the Choosing and Using Security Questions Cheat Sheet [https://www.owasp.org/index.php/Choosing_and_Using_Security_Questions_Cheat_Sheet#Step_1.29_Decide_on_Identity_Data_vs_Canned_Questions_vs._User-Created_Questions here].&lt;br /&gt;
&lt;br /&gt;
At a minimum, you should have collected some data that will allow you to send the password reset information to some out-of-band side-channel, such as a (possibly different) email address or an SMS text number, etc. to be used in Step 3.&lt;br /&gt;
&lt;br /&gt;
== Step 2) Verify Security Questions ==&lt;br /&gt;
&lt;br /&gt;
After the form on Step 1 is submitted, the application verifies that each piece of data is correct for the given username. If anything is incorrect, or if the username is not recognized, the second page displays a generic error message such as “Sorry, invalid data”. If all submitted data is correct, Step 2 should display at least two of the user’s pre-established personal security questions, along with input fields for the answers. It’s important that the answer fields are part of a single HTML form.&lt;br /&gt;
&lt;br /&gt;
Do not provide a drop-down list for the user to select the questions he wants to answer. Avoid sending the username as a parameter (hidden or otherwise) when the form on this page is submitted. The username should be stored in the server-side session where it can be retrieved as needed.&lt;br /&gt;
&lt;br /&gt;
Because users' security questions / answers generally contains much less entropy than a well-chosen password (how many likely answers are there to the typical &amp;quot;What's your favorite sports team?&amp;quot; or &amp;quot;In what city where you born?&amp;quot; security questions anyway?), make sure you limit the number of guesses attempted and if some threshold is exceeded for that user (say 3 to 5), lock out the user's account for some reasonable duration (say at least 5 minutes) and then challenge the user with some form of challenge token per standard multi-factor workflow; see #3, below) to mitigate attempts by hackers to guess the questions and reset the user's password. (It is not unreasonable to think that a user's email account may have already been compromised, so tokens that do not involve email, such as SMS or a mobile soft-token, are best.)&lt;br /&gt;
&lt;br /&gt;
==  Step 3) Send a Token Over a Side-Channel ==&lt;br /&gt;
&lt;br /&gt;
After step 2, lock out the user's account immediately. Then SMS or utilize some other multi-factor token challenge with a randomly-generated code having 8 or more characters. This introduces an “out-of-band” communication channel and adds defense-in-depth as it is another barrier for a hacker to overcome. If the bad guy has somehow managed to successfully get past steps 1 and 2, he is unlikely to have compromised the side-channel.  It is also a good idea to have the random code which your system generates to only have a limited validity period, say no more than 20 minutes or so. That way if the user doesn't get around to checking their email and their email account is later compromised, the random token used to reset the password would no longer be valid if the user never reset their password and the &amp;quot;reset password&amp;quot; token was discovered by an attacker. Of course, by all means, once a user's password has been reset, the randomly-generated token should no longer be valid.&lt;br /&gt;
&lt;br /&gt;
== Step 4) Allow user to change password in the existing session ==&lt;br /&gt;
&lt;br /&gt;
Step 4 requires input of the code sent in step 3 in the existing session where the challenge questions were answered in step 2, and allows the user to reset his password. Display a simple HTML form with one input field for the code, one for the new password, and one to confirm the new password. Verify the correct code is provided and be sure to enforce all password complexity requirements that exist in other areas of the application. As before, avoid sending the username as a parameter when the form is submitted. Finally, it's critical to have a check to prevent a user from accessing this last step without first completing steps 1 and 2 correctly. Otherwise, a [[forced browsing]] attack may be possible.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Step 5) Logging ==&lt;br /&gt;
&lt;br /&gt;
It is important to keep audit records about when password change requests were submitted, whether or not security questions were answered, when reset messages were sent to users and when users utilize them.  It is especially important to log failed attempts to answer security questions and attempted use of expired tokens.  This data can be used to detect abuse and malicious behavior.  Data such as time, IP address, and browser information can be used to spot trends of suspicious use.&lt;br /&gt;
&lt;br /&gt;
= Other Considerations =&lt;br /&gt;
* Whenever a successful password reset occurs, the session should be invalidated and the user redirected to the login page&lt;br /&gt;
* Strength of questions used for reset should vary based on the nature of the credential. Administrator credentials should have a higher requirement.&lt;br /&gt;
* The ideal implementation should rotate the questions asked in order to avoid automation&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Dave Ferguson - gmdavef[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
Jim Manico - jim[at]owasp.org&amp;lt;br/&amp;gt;&lt;br /&gt;
Kevin Wall - kevin.w.wall[at]gmail.com&amp;lt;br/&amp;gt;&lt;br /&gt;
James McGovern - james.mcgovern[at]hp.com&amp;lt;/br&amp;gt;&lt;br /&gt;
Wesley Philip - wphilip[at]ca.ibm.com&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200083</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200083"/>
				<updated>2015-09-04T22:57:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Last Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Validate X.509 Certificate for algorithm compatibility, strength of encryption, export restrictions&lt;br /&gt;
* Validate Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
* Sign assertions whenever possible&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
* Validate IDP certificates for expiry against CRL/OCSP&lt;br /&gt;
* Validate NotBefore and NotOnorAfter&lt;br /&gt;
* Define criteria for SAML logout&lt;br /&gt;
* Exchange assertions only over secure transports&lt;br /&gt;
* Define criteria for session management&lt;br /&gt;
* Validate signature whenever possible&lt;br /&gt;
* Verify user identities obtained from SAML ticket assertions whenever possible.&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200082</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200082"/>
				<updated>2015-09-04T22:56:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* First Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Validate X.509 Certificate for algorithm compatibility, strength of encryption, export restrictions&lt;br /&gt;
* Validate Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
* Sign assertions whenever possible&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
* Validate IDP certificates for expiry against CRL/OCSP&lt;br /&gt;
* Validate NotBefore and NotOnorAfter&lt;br /&gt;
* Define criteria for SAML logout&lt;br /&gt;
* Exchange assertions only over secure transports&lt;br /&gt;
* Define criteria for session management&lt;br /&gt;
* Validate signature whenever possible&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200081</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200081"/>
				<updated>2015-09-04T22:55:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Last Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Validate X.509 Certificate for algorithm compatibility, strength of encryption, export restrictions&lt;br /&gt;
* Validate Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
* Validate IDP certificates for expiry against CRL/OCSP&lt;br /&gt;
* Validate NotBefore and NotOnorAfter&lt;br /&gt;
* Define criteria for SAML logout&lt;br /&gt;
* Exchange assertions only over secure transports&lt;br /&gt;
* Define criteria for session management&lt;br /&gt;
* Validate signature whenever possible&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200080</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200080"/>
				<updated>2015-09-04T22:54:15Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* First Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Validate X.509 Certificate for algorithm compatibility, strength of encryption, export restrictions&lt;br /&gt;
* Validate Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
* Validate IDP certificates for expiry against CRL/OCSP&lt;br /&gt;
* Validate NotBefore and NotOnorAfter&lt;br /&gt;
* Define criteria for SAML logout&lt;br /&gt;
* Exchange assertions only over secure transports&lt;br /&gt;
* Define criteria for session management&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200079</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200079"/>
				<updated>2015-09-04T22:51:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Last Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
* Validate IDP certificates for expiry against CRL/OCSP&lt;br /&gt;
* Validate NotBefore and NotOnorAfter&lt;br /&gt;
* Define criteria for SAML logout&lt;br /&gt;
* Exchange assertions only over secure transports&lt;br /&gt;
* Define criteria for session management&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200078</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200078"/>
				<updated>2015-09-04T22:41:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* First Mile Considerations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
* Use/Trust Root CAs whenever possible&lt;br /&gt;
* Synchronize to a common Internet timesource&lt;br /&gt;
* Define levels of assurance for identity verification&lt;br /&gt;
* Prefer asymmetric identifiers for identity assertions over personally identifiable information (e.g. SSNs, etc)&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200077</id>
		<title>SAML Security Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SAML_Security_Cheat_Sheet&amp;diff=200077"/>
				<updated>2015-09-04T22:38:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Authors and Primary Editors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;i&amp;gt;Security Assertion Markup Language&amp;lt;/i&amp;gt; (SAML) is an open standard for exchanging authorization and authentication information. The &amp;lt;i&amp;gt;Web Browser SAML/SSO Profile with Redirect/POST bindings&amp;lt;/i&amp;gt; is one of the most common SSO implementation. This cheatsheet will focus primarily on that profile.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Validate Message Confidentiality and Integrity =&lt;br /&gt;
&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet|TLS 1.2]] is the most common solution to guarantee message confidentiality and integrity. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
** Eavesdropping 7.1.1.1&lt;br /&gt;
** Theft of User Authentication Information 7.1.1.2&lt;br /&gt;
** Theft of the Bearer Token 7.1.1.3&lt;br /&gt;
** Message Deletion 7.1.1.6&lt;br /&gt;
** Message Modification 7.1.1.7&lt;br /&gt;
** Man-in-the-middle 7.1.1.8&lt;br /&gt;
*A digitally signed message with a certified key is the most common solution to guarantee message integrity and authentication. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security (section 4)] for additional information. This step will help counter the following attacks:&lt;br /&gt;
**Man-in-the-middle 6.4.2&lt;br /&gt;
**Forged Assertion 6.4.3&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Usage=&lt;br /&gt;
&lt;br /&gt;
This is a common area for security gaps - see [http://www.ai-lab.it/armando/pub/fmse9-armando.pdf Google SSO vulnerability] (AVANTSSAR 2008)  for a real life example.  Their SSO profile was vulnerable to a Man-in-the-middle attack from a malicious SP (Service Provider). The SSO Web Browser Profile is most susceptible to attacks from trusted partners. This particular security flaw was exposed because the SAML Response did not contain all of the required data elements necessary for a secure message exchange. Following the [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profile] usage requirements for AuthnRequest (4.1.4.1) and Response (4.1.4.2) will help counter this attack. The AVANTSSAR team suggested the following data elements should be required:&lt;br /&gt;
&lt;br /&gt;
* '''AuthnRequest(ID, SP);''' An AuthnRequest must contain and ID and SP. Where ID is a string uniquely identifying the request and an SP identifies the Service Provider that initiated the request. Furthermore, the request ID attribute must be returned in the response (InResponseTo=&amp;quot;&amp;lt;requestId&amp;gt;&amp;quot;). InResponseTo helps guarantee authenticity of the response from the trusted IdP. This was one of the missing attributes that left Google's SSO vulnerable.&lt;br /&gt;
* '''Response(ID, SP, IdP, {AA} K -1/IdP);''' A Response must contain all these elements. Where ID is a string uniquely identifying the response. SP identifies the recipient of the response. IdP identifies the identity provider authorizing the response. {AA} K -1/IdP is the assertion digitally signed with the private key of the IdP.&lt;br /&gt;
* '''AuthAssert(ID, C, IdP, SP);''' An authentication assertion must exist within the Response. It must contain an ID, a client (C), an identity provider (IdP), and a service provider (SP) identifier.&lt;br /&gt;
&lt;br /&gt;
Further vulnerabilities in SAML implementations were described in 2012 ([https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91-8-23-12.pdf On Breaking SAML: Be Whoever You Want to Be]). The following recommendations were proposed in response ([http://arxiv.org/pdf/1401.7483v1.pdf Secure SAML validation to prevent XML signature wrapping attacks]):&lt;br /&gt;
&lt;br /&gt;
* Always perform schema validation on the XML document prior to using it for any security-­related purposes.&lt;br /&gt;
** Always use local, trusted copies of schemas for validation.&lt;br /&gt;
** Never allow automatic download of schemas from third party locations.&lt;br /&gt;
** If possible, inspect schemas and perform schema hardening, to disable possible wildcard ­type or relaxed processing statements.&lt;br /&gt;
* Securely validate the digital signature.&lt;br /&gt;
** If you expect only one signing key, use StaticKeySelector. Obtain the key directly from the identity provider, store it in local file and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect more than one signing key, use X509KeySelector (the JKS variant). Obtain these keys directly form the identity providers, store them in local JKS and ignore any KeyInfo elements in the document.&lt;br /&gt;
** If you expect a heterogenous signed documents (many certificates from many identity providers, multi­level validation paths), implement full trust establishment model based on PKIX and trusted root certificates.&lt;br /&gt;
* Avoid signature-wrapping attacks.&lt;br /&gt;
** Never use getElementsByTagName to select security related elements in an XML document without prior validation.&lt;br /&gt;
**Always use absolute XPath expressions to select elements, unless a hardened schema is used for validation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Protocol Processing Rules=&lt;br /&gt;
&lt;br /&gt;
This is another common area for security gaps simply because of the vast number of steps to assert. Processing a SAML response is an expensive operation but all steps must be validated.&lt;br /&gt;
*Validate AuthnRequest processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf SAML Core] (3.4.1.4) for all AuthnRequest processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
* Validate Response processing rules. Refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-profiles-2.0-os.pdf SAML Profiles] (4.1.4.3) for all Response processing rules. This step will help counter the following attacks:&lt;br /&gt;
** Stolen Assertion (6.4.1)&lt;br /&gt;
** Man-in-the-middle (6.4.2)&lt;br /&gt;
** Forged Assertion (6.4.3)&lt;br /&gt;
** Browser State Exposure (6.4.4)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Binding Implementation=&lt;br /&gt;
&lt;br /&gt;
*For an HTTP Redirect Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.4). To view an encoding example, you may want to reference RequestUtil.java found within [https://developers.google.com/google-apps/sso/saml_reference_implementation_web Google's reference implementation].&lt;br /&gt;
* For an HTTP POST Binding refer to [http://docs.oasis-open.org/security/saml/v2.0/saml-bindings-2.0-os.pdf SAML Binding] (3.5). The caching considerations are also very important. If a SAML protocol message gets cached, it can subsequently be used as a Stolen Assertion (6.4.1) or Replay (6.4.5) attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Validate Security Countermeasures=&lt;br /&gt;
&lt;br /&gt;
Revisit each security threat that exists within the [http://docs.oasis-open.org/security/saml/v2.0/saml-sec-consider-2.0-os.pdf SAML Security] document and assert you have applied the appropriate countermeasures for threats that may exist for your particular implementation. Additional countermeasures considererd should include:&lt;br /&gt;
*Prefer IP Filtering when appropriate. For example, this countermeasure could have prevented Google's initial security flaw if Google provided each trusted partner with a separate endpoint and setup an IP filter for each endpoint. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Man-in-the-middle (6.4.2)&lt;br /&gt;
*Prefer short lifetimes on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Stolen Assertion (6.4.1)&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
*Prefer OneTimeUse on the SAML Response. This step will help counter the following attacks:&lt;br /&gt;
**Browser State Exposure (6.4.4)&lt;br /&gt;
**Replay (6.4.5)&lt;br /&gt;
&lt;br /&gt;
Need an architectural diagram? The [http://www.oasis-open.org/committees/download.php/11511/sstc-saml-tech-overview-2.0-draft-03.pdf SAML technical overview] contains the most complete diagrams. For the Web Browser SSO Profile with Redirect/POST bindings refer to the section 4.1.3. In fact, of all the SAML documentation, the technical overview is the most valuable from a high-level perspective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= First and Last Mile Considerations = &lt;br /&gt;
&lt;br /&gt;
The SAML protocol is rarely the vector of choice, though it's important to have cheatsheets to make sure that this is robust. The various endpoints are more targeted, so how the SAML token is generated and how it is consumed are both important in practice. &lt;br /&gt;
&lt;br /&gt;
== First Mile Considerations ==&lt;br /&gt;
* Strong Authentication options for generating the SAML token&lt;br /&gt;
* IDP validation (which IDP mints the token)&lt;br /&gt;
&lt;br /&gt;
== Last Mile Considerations ==&lt;br /&gt;
* Validating session state for user&lt;br /&gt;
* Level of granularity in setting authZ context when consuming SAML token (do you use groups, roles, attributes)&lt;br /&gt;
* Validate authorized IDP&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Input Validation =&lt;br /&gt;
 &lt;br /&gt;
Just because SAML is a security protocol does not mean that input validation goes away. &lt;br /&gt;
&lt;br /&gt;
* Ensure that all SAML providers/consumers do proper [[Input_Validation_Cheat_Sheet | input validation]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors =&lt;br /&gt;
&lt;br /&gt;
* [http://bradbroulik.blogspot.dk/2010/01/bulletproof-sso-with-saml-20.html Brad Broulik]&lt;br /&gt;
* [https://ipsec.pl/ Paweł Krawczyk]&lt;br /&gt;
* Gunnar Peterson&lt;br /&gt;
* James McGovern&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=175630</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=175630"/>
				<updated>2014-05-23T11:55:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=175629</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=175629"/>
				<updated>2014-05-23T11:54:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 27th 2014'''&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP Mobile Top Ten Risks 2014 – The New M10: ‘Lack of Binary Protection’ Category&amp;lt;br&amp;gt;&lt;br /&gt;
Senior Security Engineer at Arxan Technologies &amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDaaS (Cloud) Landscape - Why Companies are Shifting Strategies Toward Cloud-Based Identity Management vs. Traditional Security Methods?&amp;lt;br&amp;gt;&lt;br /&gt;
Tarek Khaled, Senior Security Engineer at Okta&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Governance/ProjectProgramModels&amp;diff=174411</id>
		<title>Governance/ProjectProgramModels</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Governance/ProjectProgramModels&amp;diff=174411"/>
				<updated>2014-05-06T19:19:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Additional Comments */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Purpose = &lt;br /&gt;
OWASP needs help from our community to define an OWASP Projects Program model that will meet the needs of our leaders. To do so we are engaging the community to discuss and flush out different options. We would like to have a vote on this to ensure that the community has a say in how the foundation moves forward. &lt;br /&gt;
&lt;br /&gt;
= The Options =&lt;br /&gt;
''Please feel free to add additional bullets to any of the cells. Please do not remove existing items.''&lt;br /&gt;
&lt;br /&gt;
{| {{table border=1}}&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|'''Option'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|'''1 - Flagships get majority of resources to increase quality.'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|'''2 - Develop two separate programs:  Quality focused and Innovation focused'''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#f0f0f0;&amp;quot;|'''3 - Community project review centric model'''&lt;br /&gt;
|-&lt;br /&gt;
| '''Summary Description'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
Drop the Lab designation, and only have Incubator and Flagship projects. Flagship project status would be determined by community vote, and our resources would go towards developing Flagship projects, based on community input. Incubators would get less attention and support. &lt;br /&gt;
*Keeps both Flagships and Incubators under the same program (as official &amp;quot;OWASP Projects&amp;quot;).&lt;br /&gt;
*Would remove resources from Incubators and funnel the majority of resources into the Flagship Projects. &lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
Separate focus of OWASP projects into two separate programs. One will focus on increasing the quality of a handful of projects selected by the community, and the other program will focus on developing a platform for new leaders that facilitates innovation, research, and testing. &lt;br /&gt;
*Takes two community requests (increase quality, platform for innovation), and separate each request into to programs.&lt;br /&gt;
*Allows the foundation to have clearly defined goals for each program. &lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
This is the approach we are currently using. This approach requires that the community conduct project reviews to graduate projects, and it requires a twice yearly project audit to demote projects that are currently inactive.&lt;br /&gt;
*Current approach&lt;br /&gt;
*Requires a large task force of community reviewers to make sure our project graduation process is functioning efficiently. &lt;br /&gt;
|-&lt;br /&gt;
| '''How are Flagships Selected?'''&lt;br /&gt;
||Community Vote&lt;br /&gt;
||Community Vote&lt;br /&gt;
||Community Project Health and Quality Reviews&lt;br /&gt;
|-&lt;br /&gt;
| '''New Project Designations'''&lt;br /&gt;
||&lt;br /&gt;
*Official OWASP Project: Projects that OWASP actively maintains and promotes. In reality, these are what flagship projects should be under the current system. The majority of our resources and time should be used to improve the quality and sustain these projects. &lt;br /&gt;
*OWASP Supported Projects: These would be similar to what the incubators are under our current system. Encourages innovation and it allows starting members to become engaged and involved. These can be managed in the same way we manage incubators now. &lt;br /&gt;
*OWASP Sunset Projects: Projects like ESAPI or WebScarab would fit under this title. These are projects that are still being used by consumers, but that we will not directly support as they are not actively maintained or being worked on. &lt;br /&gt;
||&lt;br /&gt;
*OWASP Flagship Project: Projects that OWASP actively maintains and promotes. The majority of our resources and time would be used to improve the quality and sustain these projects. &lt;br /&gt;
*OWASP Incubator Projects: These would be all of the rest of our projects.  These can be managed in the same way we manage incubators and lab projects now. &lt;br /&gt;
*OWASP Sunset Projects: This is the same as Proposal 1. Projects like ESAPI or WebScarab would fit under this title. These are projects that are still being used by consumers, but that we will not directly support as they are not actively maintained or being worked on. &lt;br /&gt;
||&lt;br /&gt;
*OWASP Flagship Project: Projects that OWASP actively maintains (but does not manage) and promotes.&lt;br /&gt;
*OWASP Lab Projects: Projects with beta or stable release that wish to graduate to Lab. &lt;br /&gt;
*OWASP Incubator Projects: All new projects, managed the same way we manage incubators projects now. &lt;br /&gt;
*OWASP Sunset Projects: Projects like ESAPI or WebScarab would fit under this title. These are projects that are still being used by consumers, but that we will not directly support as they are not actively maintained or being worked on. &lt;br /&gt;
|-&lt;br /&gt;
| '''Project Quality'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
Consolidate Foundation resources to help improve quality of Flagship projects only. This will give the majority of our resources to a handful of projects.&lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
*Flagship Project Program: As mentioned above, these projects would be the ones OWASP actively maintains and seeks to increase the quality of. We can re-name this program (if necessary). Recommended that we limit the number of projects in this program for any given year (i.e. no more than 6 projects). Additionally, Flagship projects would be voted on by the community (which projects should be flagship). &lt;br /&gt;
*'''Primary Goal of the Program''': To increase the quality of a select few number of OWASP projects selected by our community stakeholders and consumers. &lt;br /&gt;
*OWASP Projects Program: This would be similar to what we have now which is a platform for research and innovation. All projects under this platform would have the same designation unless they are sunset or inactive projects. They would get the same benefits they do now and the same opportunities. &lt;br /&gt;
*'''Primary Goal of the Program''': To maintain a research and innovation platform for our community to test ideas and theories. &lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
The foundation has no direct influence over the quality of the project. The quality of the project is dependent on the project leader’s individual time, resources, and output. &lt;br /&gt;
|-&lt;br /&gt;
| '''Project Reviews'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
The Foundation facilitates a technical review of  the community selected &amp;quot;Official&amp;quot; projects once a year, and the Incubator projects only get reviewed if they ask for one. The reviews are conducted by the community for supported projects. &lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
*For the OWASP Projects Program, we would only conduct reviews for those projects that ask for them. The reviews will be primarily to give feedback to the leader about their research/ideas and on their project health. &lt;br /&gt;
*For the Flagship Program, reviews would be mandatory, and I recommend the new technical person conduct them. I further recommend they be done every quarter for each project. It is far more manageable since we would only have 6 or so projects in this program. &lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
Project reviews are only done for those projects that want reviews, or that would like to graduate to the next level.&lt;br /&gt;
|-&lt;br /&gt;
| '''Resources and Funding'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
The majority of our resources and funding will go towards the development of higher quality Official OWASP projects. Supported projects will still have access to resources, but they will be minimal. &lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
Each program would need to have their own budget. The Flagship program would only spend their funds on items that increase project quality. It would be required that flagship submit a  detailed project plan and budget. The Projects Program would have a budget that would fund items like project dev work, the project summit, OSS, marketing/design costs, etc. &lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
All projects get access to funding; however, Flagships get priority for funding for project development work. Funding items like project dev work, the project summit, OSS, marketing/design costs, etc are still available to all projects. &lt;br /&gt;
|-&lt;br /&gt;
| '''Positives of this approach'''&lt;br /&gt;
|| &amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
# Simplifies the process from an operational perspective as we would be primarily focusing on increasing the quality of a very small community selected group of projects. &lt;br /&gt;
# Increases community involvement. &lt;br /&gt;
# Incentivizes Leaders to make their projects user friendly, high quality, and highly volunteer engaged.&lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
# Separates two different focus areas into two separate programs.&lt;br /&gt;
# Increases community involvement.  &lt;br /&gt;
# Incentivizes Leaders to make their projects user friendly, high quality, and highly volunteer engaged.&lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
# No adaptation needed in the operational and financial plan for 2014&lt;br /&gt;
|-&lt;br /&gt;
| '''Negatives of this approach'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
# Community vote might turn into a popularity contest.  &lt;br /&gt;
# OWASP Official projects will take the majority of resources from all other projects.  &lt;br /&gt;
# We will still have two separate focus areas under one program. &lt;br /&gt;
# Project development work will still be dependent on volunteer resources. &lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
# Will require an additional foundation hire to manage Flagship Project Program. &lt;br /&gt;
# Project development work will still be dependent on volunteer resources. &lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
# The model requires too many resources to manage efficiently.&lt;br /&gt;
# Foundation has no direct influence over project quality. Foundation can only suggest improvements. &lt;br /&gt;
|-&lt;br /&gt;
| '''Any other considerations'''&lt;br /&gt;
||&amp;lt;!--Option 1--&amp;gt;&lt;br /&gt;
# ...&lt;br /&gt;
||&amp;lt;!--Option 2--&amp;gt;&lt;br /&gt;
# ...&lt;br /&gt;
&lt;br /&gt;
||&amp;lt;!--Option 3--&amp;gt;&lt;br /&gt;
# &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Additional Comments =&lt;br /&gt;
Use this space to provide additional comments on any of the existing text. For example, perhaps you disagree with something that is above. Please note your thoughts in this section.&lt;br /&gt;
&lt;br /&gt;
# James McGovern - I can't quite tell if this model will provide service equally to builders vs breakers vs defenders. Has OWASP looked at models that are role-aligned? For example stuff that CISOs care about vs developers vs project managers, etc&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159838</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159838"/>
				<updated>2013-10-07T14:54:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159837</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159837"/>
				<updated>2013-10-07T14:53:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the Travelers in Hartford&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159836</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159836"/>
				<updated>2013-10-07T14:52:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159835</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159835"/>
				<updated>2013-10-07T14:51:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, October 22nd 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Mobile Security: Attacks and Defenses&amp;lt;br&amp;gt;&lt;br /&gt;
Gene Meltser, Technical Director, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
An Application Pen Tester's introduction to Android Internals&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Palarz, Senior Security Consultant, Neohapsis Labs&amp;lt;br&amp;gt;&lt;br /&gt;
7:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159834</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=159834"/>
				<updated>2013-10-07T14:49:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Call for Sponsors/Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Hacking Amazon Cloud&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Hacking Medical Devices&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 25th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=153668</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=153668"/>
				<updated>2013-06-14T13:23:41Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 25th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Building a Better Botnet&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Smith, Akamai&amp;lt;br&amp;gt;&lt;br /&gt;
5:00 PM to 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers, Hartford CT (Central Row Conference Room)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting was held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149990</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149990"/>
				<updated>2013-04-17T15:42:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 24th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Cloud and Identity&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Enterprise Architect - MassMutual&amp;lt;br&amp;gt;&lt;br /&gt;
8:30 AM to Noon&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at IBM, 755 Main Street, Hartford CT (The Gold Building)&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;br /&gt;
[[Category:Inactive Chapter]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149988</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149988"/>
				<updated>2013-04-17T15:38:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;br /&gt;
[[Category:Inactive Chapter]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149502</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149502"/>
				<updated>2013-04-09T20:16:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leaders are [mailto:james.mcgovern@hp.com James McGovern] and [mailto:npatloll@travelers.com Narendra Patlolla]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.travelers.com/ Travelers], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:james.mcgovern@hp.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;br /&gt;
[[Category:Inactive Chapter]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149501</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=149501"/>
				<updated>2013-04-09T20:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Upcoming Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 6th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Web Services Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, HP Enterprise Services&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at the ACORD LOMA Forum in Las Vegas&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Postponed Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, April 16th 2013'''&amp;lt;br&amp;gt;&lt;br /&gt;
Why We Need DevOps Now: A Fourteen Year Study Of High Performing IT Organizations &amp;lt;br&amp;gt;&lt;br /&gt;
Gene Kim - CTO of Tripwire&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Travelers in Downtown Hartford&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;br /&gt;
[[Category:Inactive Chapter]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=140328</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=140328"/>
				<updated>2012-11-27T21:38:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is &amp;lt;!-- [mailto:owasp@jamesmcgovern.com James McGovern]--&amp;gt;|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, October 24th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
International Institute of Business Analysts (IIBA) Joint Meeting&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern - Introduction to Security for Business Analysts&amp;lt;br&amp;gt;&lt;br /&gt;
This meeting will be held at Chubb in Simsbury&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, September 26th 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with OWASP Student Chapter&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to Network Security&amp;lt;br&amp;gt;&lt;br /&gt;
Anthony DAmato&amp;lt;/br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Wednesday, May 23rd 2012'''&amp;lt;br&amp;gt;&lt;br /&gt;
Introduction to SOA Security&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Connecticut]]&lt;br /&gt;
[[Category:Inactive Chapter]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=111685</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=111685"/>
				<updated>2011-06-03T13:08:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Call for Sponsors/Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Cloud Security with a focus on PAAS&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Mobile Security&lt;br /&gt;
* Entitlements Management&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=111684</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=111684"/>
				<updated>2011-06-03T13:06:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.hp.com/ HP], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011/Open_letter_to_WebAppSec_Tool_and_Services_vendors:_Release_your_schemas_and_allow_automation&amp;diff=104051</id>
		<title>Summit 2011/Open letter to WebAppSec Tool and Services vendors: Release your schemas and allow automation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011/Open_letter_to_WebAppSec_Tool_and_Services_vendors:_Release_your_schemas_and_allow_automation&amp;diff=104051"/>
				<updated>2011-02-07T13:50:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;BR&amp;gt;__TOC__&amp;lt;BR&amp;gt;&lt;br /&gt;
'''IMPORTANT DISCLAIMER: THIS LETTER IS NOT AN OFFICIAL OWASP POSITION. THE OWNERSHIP OF ITS REQUEST BELONGS TO THE NAMES UNDER THE 'SIGNED BY' SECTION'''&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
{{:Summit_2011/Open_letter_to_WebAppSec_Tool_and_Services_vendors:_Release_your_schemas_and_allow_automation/Letter_Content}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
==Signed by==&lt;br /&gt;
* Dinis Cruz - Application Security Consultant - Independent&lt;br /&gt;
* Sebastien Deleersnyder - Managing Technical Consultant - SAIT Zenitel&lt;br /&gt;
* Jim Manico - CEO - Infrared Security&lt;br /&gt;
* Alexander Meisel - CTO - art of defence&lt;br /&gt;
* Sven Vetsch - Senior Security Tester - Dreamlab Technologies&lt;br /&gt;
* Daniel Cuthbert - Assessment Manager - SensePost&lt;br /&gt;
* Eoin Keary - EMEIA Attack &amp;amp; Penetration Senior Manager - Ernst &amp;amp; Young&lt;br /&gt;
* Anurag Agarwal - Founder - MyAppSecurity&lt;br /&gt;
* Zaki Akhmad - Security Analyst - indocisc&lt;br /&gt;
* Sebastien Gioria - Head of Security and IT Audit - Groupe Y&lt;br /&gt;
* Paolo Perego - Application Security Specialist - armoredcode.com&lt;br /&gt;
* Steven van der Baan - Software Architect - Sogeti Nederland&lt;br /&gt;
* Andres Andreu - CTO &amp;amp; Founder - neuroFuzz&lt;br /&gt;
* Marinus Kuivenhoven - Sr. Security Specialist - Sogeti Nederland&lt;br /&gt;
* James McGovern - Chief Security Architect - The Hartford&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please use the format: {Name - Role - Company}&lt;br /&gt;
&lt;br /&gt;
==Vendors that commit to deliver the requested materials==&lt;br /&gt;
* art of defence&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Speakers_Project&amp;diff=97389</id>
		<title>Category:OWASP Speakers Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Speakers_Project&amp;diff=97389"/>
				<updated>2010-12-21T16:02:29Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* available speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This program lead by [[:user:Knoblochmartin|Martin Knobloch]] helps local chapters or application security conferences to find OWASP related speakers to have OWASP presenters on site.&lt;br /&gt;
&lt;br /&gt;
This program allows two parties to find each other:&lt;br /&gt;
&lt;br /&gt;
* Local chapters or application security events that want to attract an OWASP speaker&lt;br /&gt;
* OWASP speakers to entertain OWASP presentations and that want to see the world&lt;br /&gt;
&lt;br /&gt;
For sponsorship, see the [[:Category:OWASP_on_the_Move_Project|OWASP on the Move Project]] page&lt;br /&gt;
&lt;br /&gt;
== available presentations ==&lt;br /&gt;
&lt;br /&gt;
== available speakers  ==&lt;br /&gt;
&lt;br /&gt;
If you want to (re)do an OWASP related presentation, propose them here with your availability boundaries (timing/geographical) &lt;br /&gt;
&lt;br /&gt;
*Add your name, contact and bio information to become available as OWASP Speaker!&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Introduction &lt;br /&gt;
! Available Area &lt;br /&gt;
! Bios&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:Robert(at)ZakonGroup.com Robert H'obbes' Zakon] &lt;br /&gt;
| Presenter on Web Application Security, OWASP Top 10, PHP Security, and assorted other topics.  Training sessions taught at events such as [http://www.zakongroup.com/technology/services-training.shtml OWASP, ACSAC, and CCS].  Based in New Hampshire, and available for travel worldwide.  Fluent in English, and able to converse in Portuguese.  A developer and consultant for the past decade, formerly a Principal Engineer with MITRE's InfoSec Group. &lt;br /&gt;
| Global (USA/NH-based) &lt;br /&gt;
| [http://www.zakon.org/robert/vitae.html BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:jmcgovern@virtusa.com James McGovern] &lt;br /&gt;
| Presenter on Enterprise Architecture and Web Application Security, SOA Web Services Security and Federated Identity.   &lt;br /&gt;
| Global (USA/CT-based) &lt;br /&gt;
| [http://www.linkedin.com/in/jamesmcgovern BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:chuck(at)McCulloughAssociates.com Chuck McCullough] &lt;br /&gt;
| Chuck provides training sessions to developers on the Top 10. Chuck welcomes speaking opportunities to any group. Chuck is available in the Texas area and at various other locations in the USA. &lt;br /&gt;
| USA/Texas &lt;br /&gt;
| [http://www.linkedin.com/in/chuckmccullough BIO]&lt;br /&gt;
|-&lt;br /&gt;
| Marc Curphey &lt;br /&gt;
| Marc will happily speak about the WebAppSec industry, SDLC etc. around Europe. You can see him in action at [http://video.hitb.org/2006.html HITB with John Viega] (big download) &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/in/curphey BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:tomb(at)owasp.org Tom Brennan] &lt;br /&gt;
| based in NYC Metro Tom is a long time volunteer and OWASP contributor and [http://www.owasp.org/index.php/About_OWASP Global Board Member]. As a security evangelist for [http://www.whitehatsec.com WhiteHat Security] top frequently talks about application security including the [http://www.owasp.org/images/0/06/WPstats_fall09_8th.pdf &amp;quot;Stats Report&amp;quot;]. He is available for global speaking venues to educate audiences about the OWASP Foundation core mission, how it works and various projects. In addition he also provides regular talks on honeypot research and case-studies about tactical experiences when conducting [http://en.wikipedia.org/wiki/Red_Team Red Team]/Tiger Team assessments involving the application, network, wireless and physical security. &lt;br /&gt;
| Global &lt;br /&gt;
| [http://www.linkedin.com/in/tombrennan BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:thesp0nge@owasp.org Paolo Perego] &lt;br /&gt;
| Paolo is available to talk about [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Orizon project], safe coding and code review issues around Europe in the near October-December. &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/in/thesp0nge BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:marc.m.morana@gmail.org Marco Morana] &lt;br /&gt;
| Marco is available to talk about [http://iac.dtic.mil/iatac/download/security.pdf Software Security Frameworks]and Secure Code Reviews [https://www.cmpevents.com/CSI33/a.asp?option=G&amp;amp;V=3&amp;amp;id=443342 see 07 CSI conference as reference] in USA around November-December and in Europe around January-February &lt;br /&gt;
| Europe &lt;br /&gt;
| [http://www.linkedin.com/pub/2/a7a/59b BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:sebastien.gioria@owasp.fr Sébastien Gioria] &lt;br /&gt;
| Sebastien is available to talk about WebAppSec, educational purpose on AppSec in French or at least in english around France/Europe/Canada from middle of March 08. You can find some Talk on the [http://www.owasp.fr Owasp France Chapter] &lt;br /&gt;
| France/Europe/Canada &lt;br /&gt;
| [http://www.linkedin.com/in/gioria BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:mkraushar@gmail.com Mordecai Kraushar] &lt;br /&gt;
| Mordecai is available to talk about different topics within the Web application security space. One discussion involves the OWASP project [http://www.owasp.org/index.php/Category:OWASP_Vicnum_Project Vicnum], a flexible vulnerable web application that can be used in 'capture the flag' exercises. &lt;br /&gt;
| Northeastern United States &lt;br /&gt;
| [http://www.linkedin.com/in/mkraushar BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:michael.coates@owasp.org Michael Coates] &lt;br /&gt;
| Michael is available to talk on a variety of web application security topics. Talks are interactive and include live demos and code examples. Michael has spoken at multiple OWASP conferences and University security courses on topics such as Introduction to Application Security, Automated Defense Systems in Applications, Real Time Detection and Prevention of Application Worms, and security risks in SSL/TLS. Michael is based in &amp;lt;strike&amp;gt;Chicago&amp;lt;/strike&amp;gt; San Francisco and able to travel where needed. &lt;br /&gt;
| USA/San Francisco &lt;br /&gt;
| [http://www.linkedin.com/in/mcoates BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:dan.cornell@owasp.org Dan Cornell] &lt;br /&gt;
| Dan Cornell has over twelve years of experience architecting, developing and securing web-based software systems. He speaks on a variety of software development and software security topics such as Vulnerability Management, Software Security Remediation, and Code Review/Static Analysis. Dan is based in San Antonio, TX and available to fly/drive as needed to the site. &lt;br /&gt;
| USA/San Antonio &lt;br /&gt;
| [http://www.denimgroup.com/about_team_dan.html BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:John.Steven@owasp.org John Steven] &lt;br /&gt;
| John speaks on a variety of topics including &amp;quot;How to build your own application security group&amp;quot;, &amp;quot;Threat Modeling&amp;quot;, &amp;quot;Code Review and Static analysis&amp;quot;, as well as other topics. John has spoken at and given tutorials for multiple OWASP conferences. John frequents New York, Boston, Washington DC, and Charlotte, but is available for travel elsewhere. &lt;br /&gt;
| Washington, DC/USA &lt;br /&gt;
| [http://www.cigital.com/about/team/management.php#jsteven BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:blake@owasp.org Blake Cornell] &lt;br /&gt;
| Blake is available to speak regarding topics including Security v. HIPPA, Penetration Testing Methodologies, Fuzzing and Blended Threats such as attacking VoIP with the OWASP Top 10. Blake lives in the NY Metro area and is available for speaking at regional, national and world wide events. &lt;br /&gt;
| New York, NY/USA &lt;br /&gt;
| [http://www.linkedin.com/in/blakecornell BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:Nick.Coblentz@gmail.com Nick Coblentz] &lt;br /&gt;
| Nick regularly performs research related to secure software development. He is available to present on topics such as the [http://www.owasp.org/index.php/Category:Software_Assurance_Maturity_Model Software Assurance Maturity Model (SAMM)], the [http://nickcoblentz.blogspot.com/2009/06/samm-inteview-template-version-10.html SAMM Interview Template], [http://nickcoblentz.blogspot.com/2009/05/issa-journal-web-application-security.html Building Web Application Security Portfolios], and [http://nickcoblentz.blogspot.com/2009/11/owasp-presentation-on-dec-10-microsoft.html The Microsoft SDL for Agile Development]. Please email Nick if you see articles on his [http://nickcoblentz.blogspot.com/ blog] that you would like him to present. &lt;br /&gt;
| USA/Kansas, Oklahoma, Missouri &lt;br /&gt;
| [http://www.linkedin.com/in/ncoblentz BIO]&lt;br /&gt;
|-&lt;br /&gt;
| [mailto:johnccr@yahoo.com Juan Carlos Calderon] &lt;br /&gt;
| Juan has being part of the Appliction Security industry for 9 years, currently performs research on application and information security arena. He is available to present &amp;quot;Preparing an strategy for application vulnerability detection&amp;quot;, &amp;quot;Owasp Spanish and Internationalization&amp;quot; and &amp;quot;Análisis y efectos del cibercrimen en Mexico&amp;quot;(Analysis and effects of cibercrime in México). He is also open to talk about other topics related to OWASP materials and tools, send him a note to verify the coverage. &lt;br /&gt;
| Aguascalientes/México &lt;br /&gt;
| [http://www.linkedin.com/in/juancarloscalderon BIO]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Add your name, contact and bio information to become available as OWASP Speaker!&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_XML_Security_Gateway_Evaluation_Criteria_Project&amp;diff=97388</id>
		<title>Category:OWASP XML Security Gateway Evaluation Criteria Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_XML_Security_Gateway_Evaluation_Criteria_Project&amp;diff=97388"/>
				<updated>2010-12-21T15:56:56Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{:Template:Orphaned Projects}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Main  ====&lt;br /&gt;
&lt;br /&gt;
== Welcome to the XML Security Gateway Evaluation Criteria Project ==&lt;br /&gt;
&lt;br /&gt;
This OWASP Project defines an open standard for evaluating XML Security Gateways. This criteria will provide the OWASP community a set of standard evaluation criteria to assess the functionality and quality of XML Security Gateways. The main driver for this project is to reduce the confusion and complexity in assessing the strengths and weaknesses of solutions in this the XML Security space, and enlightening the community as to the utility of XML Security Gateways to deliver a number of valuable security services.&lt;br /&gt;
&lt;br /&gt;
== Project Guiding Principles: ==&lt;br /&gt;
&lt;br /&gt;
The XML Security Gateway Evaluation Criteria (XSGEC) Projectâs Guiding Principles were created in order to express the intentions of its contributors when designing the criteria.&lt;br /&gt;
   &lt;br /&gt;
* Create evaluation criteria supporting a transparent, level playing field for XML Security Gateway solutions to define their solution's key value proposition&lt;br /&gt;
  &lt;br /&gt;
* Where practical, attempt to standardize nomenclature and metrics&lt;br /&gt;
&lt;br /&gt;
* Educate the community on the design considerations for XML security&lt;br /&gt;
&lt;br /&gt;
== Project Scope: ==&lt;br /&gt;
&lt;br /&gt;
This project will focus on evaluation criteria for XML Security Gateways, that are commonly used in SOAP, Web services, SOA, and Rest applications.&lt;br /&gt;
&lt;br /&gt;
== Versions: ==&lt;br /&gt;
&lt;br /&gt;
The latest version of the XSGEC is here&lt;br /&gt;
https://www.owasp.org/index.php/Category:OWASP_XML_Security_Gateway_Evaluation_Criteria_Project_Latest&lt;br /&gt;
&lt;br /&gt;
== Feedback and Participation: ==&lt;br /&gt;
&lt;br /&gt;
We hope you find the OWASP XML Security Gateway Project useful. Please contribute to the Project by volunteering for one of the Tasks, sending your comments, questions, and suggestions to owasp@owasp.org.  To join the OWASP XML Security Gateway Project mailing list or view the archives, please visit http://lists.owasp.org/mailman/listinfo/owasp-xsgec&lt;br /&gt;
&lt;br /&gt;
== Project Contributors: ==&lt;br /&gt;
&lt;br /&gt;
If you contribute to this Project, please add your name here&lt;br /&gt;
Project Lead:&lt;br /&gt;
 &lt;br /&gt;
* Gunnar Peterson.  He can be reached at gunnar@arctecgroup.net &lt;br /&gt;
&lt;br /&gt;
Contributors:&lt;br /&gt;
&lt;br /&gt;
* James McGovern, Virtusa&lt;br /&gt;
* Sebastien Deleersnyder, Telindus&lt;br /&gt;
* Muthu Meyyappan, United Healthcare&lt;br /&gt;
* Mark O'Neill, Vordel&lt;br /&gt;
* Ivan Ristic, Breach Security&lt;br /&gt;
* Brian Roddy, Cisco&lt;br /&gt;
* Philippe Bogaerts, NetAppSec&lt;br /&gt;
* Paul Lesov, Wells Fargo&lt;br /&gt;
* Lori MacVittie, F5 Networks&lt;br /&gt;
&lt;br /&gt;
== More Information: ==&lt;br /&gt;
&lt;br /&gt;
Security Concepts, Challenges, and Design Considerations for Web Services Integration, By Howard Lipson and Gunnar Peterson&lt;br /&gt;
https://buildsecurityin.us-cert.gov/daisy/bsi/articles/best-practices/assembly/639.html?branch=1&amp;amp;language=1&lt;br /&gt;
&lt;br /&gt;
Web Application Firewall Evaluation Criteria - WASC project with similar approach, focused on the Web App FW space&lt;br /&gt;
http://www.webappsec.org/projects/wafec/&lt;br /&gt;
&lt;br /&gt;
==== Project Details ====&lt;br /&gt;
&amp;lt;!--{{:OWASP XML Security Gateway Evaluation Criteria Project - Project Identification}}--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC Project Details/OWASP XML Security Gateway Evaluation Criteria Project | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project|XML Security Gateway Evaluation Criteria Project]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Requirements_Project&amp;diff=97387</id>
		<title>Project Information:template Application Security Requirements Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Application_Security_Requirements_Project&amp;diff=97387"/>
				<updated>2010-12-21T15:54:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Application Security Requirements Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| &lt;br /&gt;
* The intent of this project is to assemble a useful base of generic/common web application security requirements that could be used in most projects.&lt;br /&gt;
* The product of this project is intended to help all involved in web application security, whether it is project management, risk assessment, software development, testing, etc.&lt;br /&gt;
* The ''reason d'etre'' of this project is that, whilst security requirements are sometimes well captured and clearly defined, there are other times when they are not, for any number of reasons.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:matthew.chalmers(at)owasp.org '''Matthew Chalmers''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-appsec-requirements '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:owasp-appsec-requirements(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:jmcgovern(at)virtusa.com '''James McGovern''']&amp;lt;br&amp;gt;&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:name(at)name '''Name''']&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Repository on &amp;quot;Google Code&amp;quot; [http://code.google.com/] &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Secure Software Contract Annex]]&lt;br /&gt;
* &lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sponsor name, if applicable  &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[:Category:OWASP Application Security Requirements Project RoadMap|'''Project Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''First Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Application Security Requirements Project - First Review - Self Evaluation - A|See&amp;amp;Edit: First Review/SelfEvaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Not yet''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Application Security Requirements Project - First Review - First Reviewer - B|See&amp;amp;Edit: First Review/1st Reviewer (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Application Security Requirements Project - First Review - Second Reviewer - C|See&amp;amp;Edit: First Review/2nd Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Alpha Status''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Application Security Requirements Project - First Review - OWASP Board Member - D|See/Edit: First Review/Board Member (D)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94329</id>
		<title>OWASP Trainers/Volunteer 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94329"/>
				<updated>2010-11-29T18:48:36Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = James McGovern &amp;lt;!--Please replace 'Volunteer 10' by your name --&amp;gt;&lt;br /&gt;
| trainer_email1 = jmcgovern@virtusa.com &amp;lt;!--Please replace all this text by your email address --&amp;gt;&lt;br /&gt;
| trainer_wiki_username1 = jm04469 &amp;lt;!--Please replace this text by your wiki username --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = &amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Enterprise Architecture Perspectives on Web Application Security&amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten &lt;br /&gt;
| project_already_presented_url_1 = http://www.owasp.org/index.php/Top_10_2010&lt;br /&gt;
| project_already_presented_name2 = Software Assurance Maturity Model (SAMM)&lt;br /&gt;
| project_already_presented_url_2 = http://www.opensamm.org/&lt;br /&gt;
| project_already_presented_name3 = ESAPI&lt;br /&gt;
| project_already_presented_url_3 = http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| current_location = Hartford Connecticut, U.S.A.  &amp;lt;!--Please replace this text by the name of the city where you are based --&amp;gt;  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_10 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_10 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94328</id>
		<title>OWASP Trainers/Volunteer 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94328"/>
				<updated>2010-11-29T18:47:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = James McGovern &amp;lt;!--Please replace 'Volunteer 10' by your name --&amp;gt;&lt;br /&gt;
| trainer_email1 = jmcgovern@virtusa.com &amp;lt;!--Please replace all this text by your email address --&amp;gt;&lt;br /&gt;
| trainer_wiki_username1 = jm04469 &amp;lt;!--Please replace this text by your wiki username --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = &amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Enterprise Architecture Perspectives on Web Application Security&amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten &lt;br /&gt;
| project_already_presented_url_1 = http://www.owasp.org/index.php/Top_10_2010&lt;br /&gt;
| project_already_presented_name2 = Software Assurance Maturity Model (SAMM)&lt;br /&gt;
| project_already_presented_url_2 = http://www.opensamm.org/&lt;br /&gt;
| project_already_presented_name3 = ESAPI&lt;br /&gt;
| project_already_presented_url_3 = http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| Hartford Connecticut = &amp;lt;!--Please replace this text by the name of the city where you are based --&amp;gt;  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_10 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_10 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94327</id>
		<title>OWASP Trainers/Volunteer 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94327"/>
				<updated>2010-11-29T18:46:42Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = James McGovern &amp;lt;!--Please replace 'Volunteer 10' by your name --&amp;gt;&lt;br /&gt;
| trainer_email1 = jmcgovern@virtusa.com &amp;lt;!--Please replace all this text by your email address --&amp;gt;&lt;br /&gt;
| trainer_wiki_username1 = jm04469 &amp;lt;!--Please replace this text by your wiki username --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = &amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Enterprise Architecture Perspectives on Web Application Security&amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten &lt;br /&gt;
| project_already_presented_url_1 = http://www.owasp.org/index.php/Top_10_2010&lt;br /&gt;
| project_already_presented_name2 = Software Assurance Maturity Model (SAMM)&lt;br /&gt;
| project_already_presented_url_2 = http://www.opensamm.org/&lt;br /&gt;
| project_already_presented_name3 = ESAPI&lt;br /&gt;
| project_already_presented_url_3 = http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| Hartford, CT = &amp;lt;!--Please replace this text by the name of the city where you are based --&amp;gt;  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_10 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_10 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94325</id>
		<title>OWASP Trainers/Volunteer 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Trainers/Volunteer_10&amp;diff=94325"/>
				<updated>2010-11-29T18:46:04Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Trainers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| trainer_name1 = James McGovern &amp;lt;!--Please replace 'Volunteer 10' by your name --&amp;gt;&lt;br /&gt;
| trainer_email1 = jmcgovern@virtusa.com &amp;lt;!--Please replace all this text by your email address --&amp;gt;&lt;br /&gt;
| trainer_wiki_username1 = jm04469 &amp;lt;!--Please replace this text by your wiki username --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = &amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_interested_in_presenting = Enterprise Architecture Perspectives on Web Application Security&amp;lt;!--Please replace this text by the projects' NAME you are interested in presenting --&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_already_presented_name1 = OWASP Top Ten &lt;br /&gt;
| project_already_presented_url_1 = http://www.owasp.org/index.php/Top_10_2010&lt;br /&gt;
| project_already_presented_name2 = Software Assurance Maturity Model (SAMM)&lt;br /&gt;
| project_already_presented_url_2 = http://www.opensamm.org/&lt;br /&gt;
| project_already_presented_name3 = ESAPI&lt;br /&gt;
| project_already_presented_url_3 = http://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API&lt;br /&gt;
| project_already_presented_name4 = &lt;br /&gt;
| project_already_presented_url_4 = &lt;br /&gt;
| project_already_presented_name5 = &lt;br /&gt;
| project_already_presented_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| current_location = &amp;lt;!--Please replace this text by the name of the city where you are based --&amp;gt;  &lt;br /&gt;
|-&lt;br /&gt;
| trainer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_10 &lt;br /&gt;
| trainer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; OWASP_Trainers/Volunteer_10 &lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Jm04469&amp;diff=88577</id>
		<title>User:Jm04469</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Jm04469&amp;diff=88577"/>
				<updated>2010-09-02T18:30:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: Created page with 'James McGovern is a Director with Virtusa in their Insurance SBU. Virtusa is an IT consulting outsourcing company with agile software development and application rationalization …'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;James McGovern is a Director with Virtusa in their Insurance SBU. Virtusa is an IT consulting outsourcing company with agile software development and application rationalization services. Previously, James was an Enterprise Architect for The Hartford (Fortune 97) and served in the role of Chief Security Architect.&lt;br /&gt;
&lt;br /&gt;
James has been involved in the Information Technology industry for over twenty years. He is passionate about Enterprise Architecture, SOA, Open Source, Identity &amp;amp; Privacy and Social Media. James is the OWASP Chapter Leader for Hartford Connecticut. James is a frequent [http://duckdown.blogspot.com/ blogger] and [http://twitter.com/mcgoverntheory twitterholic]. He has written dozens of articles for publications such as IEEE Security &amp;amp; Privacy, CIO Magazine and Java Developers Journal. He frequently speaks at major industry conferences on the human aspects of technology. He holds certifications from Microsoft, Cisco and Sun.&lt;br /&gt;
&lt;br /&gt;
For more detailed information, please see my public LinkedIn [http://www.linkedin.com/in/JamesMcGovern profile]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GPC_Project_Reviewers/Volunteer_3&amp;diff=88551</id>
		<title>GPC Project Reviewers/Volunteer 3</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GPC_Project_Reviewers/Volunteer_3&amp;diff=88551"/>
				<updated>2010-09-02T16:09:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;OWASP Reviewers Volunteers Tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| project_reviewer_name1 = James McGovern&lt;br /&gt;
| project_reviewer_email1 = JMcGovern@virtusa.com&lt;br /&gt;
| project_reviewer_wiki_username1 = jm04469&lt;br /&gt;
|-&lt;br /&gt;
| type_of_project_interested_in_reviewing = Anything of interest to CIO, CISO and Chief Architect audience&lt;br /&gt;
|-&lt;br /&gt;
| project_currently_reviewing_name1 = &amp;lt;!--Please replace this text by the project's NAME you are interested in reviewing --&amp;gt;&lt;br /&gt;
| project_currently_reviewing_url_1 = &amp;lt;!--Please replace this text by the project's LINK you are interested in reviewing --&amp;gt;&lt;br /&gt;
| project_currently_reviewing_name2 =  &lt;br /&gt;
| project_currently_reviewing_url_2 = &lt;br /&gt;
| project_currently_reviewing_name3 = &lt;br /&gt;
| project_currently_reviewing_url_3 = &lt;br /&gt;
| project_currently_reviewing_name4 = &lt;br /&gt;
| project_currently_reviewing_url_4 = &lt;br /&gt;
| project_currently_reviewing_name5 = &lt;br /&gt;
| project_currently_reviewing_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
|project_reviewed_name1 = &amp;lt;!--Please replace this text by the project's NAME you did review --&amp;gt;&lt;br /&gt;
|project_reviewed_url_1 = &amp;lt;!--Please replace this text by the project's LINK you did review --&amp;gt;&lt;br /&gt;
|project_reviewed_name2 = &lt;br /&gt;
|project_reviewed_url_2 = &lt;br /&gt;
|project_reviewed_name3 = &lt;br /&gt;
|project_reviewed_url_3 = &lt;br /&gt;
|project_reviewed_name4 = &lt;br /&gt;
|project_reviewed_url_4 = &lt;br /&gt;
|project_reviewed_name5 = &lt;br /&gt;
|project_reviewed_url_5 = &lt;br /&gt;
|-&lt;br /&gt;
| reviewer_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Volunteer_3&lt;br /&gt;
| reviewer_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; GPC_Project_Reviewers/Volunteer_3&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=85233</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=85233"/>
				<updated>2010-06-22T17:23:44Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Sponsors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.teksystems.com/ Tek Systems], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, June 22nd 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Meeting is canceled. Will be rescheduled for August.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=83784</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=83784"/>
				<updated>2010-05-20T20:23:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.teksystems.com/ Tek Systems], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, June 22nd 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW OUTSOURCING FIRMS CAN EMBED BACKDOORS INTO APPLICATIONS WITHOUT GETTING CAUGHT&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Tuesday, May 18th 2010'''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dmitry Zhdanov presentation is located [http://www.owasp.org/images/1/16/OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Wireman presentation is located [http://www.owasp.org/images/d/d4/OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
James Ritche presentation is located [http://www.owasp.org/images/7/7c/IT_Application_Audit_Principles-James_Ritche.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
Mark Coderre presentation is located [http://www.owasp.org/images/d/d3/Secure_Web_Applications_Mark_Coderre.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Secure_Web_Applications_Mark_Coderre.ppt&amp;diff=83783</id>
		<title>File:Secure Web Applications Mark Coderre.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Secure_Web_Applications_Mark_Coderre.ppt&amp;diff=83783"/>
				<updated>2010-05-20T20:17:02Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:IT_Application_Audit_Principles-James_Ritche.ppt&amp;diff=83782</id>
		<title>File:IT Application Audit Principles-James Ritche.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:IT_Application_Audit_Principles-James_Ritche.ppt&amp;diff=83782"/>
				<updated>2010-05-20T20:16:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx&amp;diff=83781</id>
		<title>File:OWASP ISACA Hartford Secure Coding-Mark Wireman.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_ISACA_Hartford_Secure_Coding-Mark_Wireman.pptx&amp;diff=83781"/>
				<updated>2010-05-20T20:14:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx&amp;diff=83780</id>
		<title>File:OWASP ISACA Hartford Secure Coding v2-Dmitry Zhdanov.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_ISACA_Hartford_Secure_Coding_v2-Dmitry_Zhdanov.pptx&amp;diff=83780"/>
				<updated>2010-05-20T20:12:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: Secure coding: Dmitry_Zhdanov&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Secure coding: Dmitry_Zhdanov&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=80864</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=80864"/>
				<updated>2010-04-01T16:19:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.teksystems.com/ Tek Systems], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
== Tuesday, February 16th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We are seeking sponsorship for food and beverages for this event&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OPENING REMARKS: 5:00 - 5:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Data Environmentalism: Rethinking our Approach to Data : 5:15 - 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Trevor Hughes, CTO [http://www.artecgroup.net/ Artec]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
FOOD BREAK: 6:00 - 6:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
J. Trevor Hughes is the Executive Director of the International Association of Privacy Professionals (IAPP).  In this role, Hughes leads the world’s largest association of privacy professionals. &lt;br /&gt;
&lt;br /&gt;
== Tuesday, May 18th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Joint Meeting with ISACA on the topic of auditing web applications&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=78218</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=78218"/>
				<updated>2010-02-10T17:15:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Call for Sponsors/Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.teksystems.com/ Tek Systems], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
== Tuesday, February 16th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We are seeking sponsorship for food and beverages for this event&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OPENING REMARKS: 5:00 - 5:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Data Environmentalism: Rethinking our Approach to Data : 5:15 - 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Trevor Hughes, CTO [http://www.artecgroup.net/ Artec]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
FOOD BREAK: 6:00 - 6:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
J. Trevor Hughes is the Executive Director of the International Association of Privacy Professionals (IAPP).  In this role, Hughes leads the world’s largest association of privacy professionals. &lt;br /&gt;
&lt;br /&gt;
== Tuesday, April 20th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mary Ann Davidson, CSO of Oracle&lt;br /&gt;
&lt;br /&gt;
== Thursday, July 22nd 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Threat modeling&lt;br /&gt;
* Advanced Persistent Threats&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Misuse/abuse cases for business analysts&lt;br /&gt;
&lt;br /&gt;
Speaking at a upcoming meeting on a OWASP project or vendor agnostic research topic. [http://www.easychair.org/conferences/?conf=owaspnyc2010 SUBMIT HERE]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Hartford&amp;diff=74828</id>
		<title>Hartford</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Hartford&amp;diff=74828"/>
				<updated>2009-12-06T23:12:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jm04469: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Hartford|extra=The chapter leader is [mailto:owasp@jamesmcgovern.com James McGovern]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-hartford|emailarchives=http://lists.owasp.org/pipermail/owasp-hartford}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
We would like to thank [http://www.teksystems.com/ Tek Systems], [http://www.oracle.com/ Oracle], [http://www.ca.com/ CA], [http://www.thehartford.com/ The Hartford] and [http://www.microsoft.com/ Microsoft] for their generous sponsorship and helping make application security visible...&lt;br /&gt;
&lt;br /&gt;
If you would like to sponsor either the food and/or door prizes for an upcoming meeting, please email [mailto:owasp@jamesmcgovern.com James McGovern] with your proposal. Independent of any financial considerations, sponsorship priority is driven by those who drive participation in OWASP to their employees and customers.&lt;br /&gt;
&lt;br /&gt;
== Tuesday, February 16th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
We are seeking sponsorship for food and beverages for this event&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OPENING REMARKS: 5:00 - 5:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
James McGovern, [http://twitter.com/mcgoverntheory OWASP Hartford Chapter Leader]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Data Environmentalism: Rethinking our Approach to Data : 5:15 - 6:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Trevor Hughes, CTO [http://www.artecgroup.net/ Artec]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
FOOD BREAK: 6:00 - 6:15 PM&amp;lt;br&amp;gt;&lt;br /&gt;
J. Trevor Hughes is the Executive Director of the International Association of Privacy Professionals (IAPP).  In this role, Hughes leads the world’s largest association of privacy professionals. &lt;br /&gt;
&lt;br /&gt;
== Tuesday, April 20th 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mary Ann Davidson, CSO of Oracle&lt;br /&gt;
&lt;br /&gt;
== Thursday, July 22nd 2010 ==&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Call for Sponsors/Speakers ==&lt;br /&gt;
&lt;br /&gt;
This is a call for speakers/papers. If we haven't approached you, but you believe you have a significant discovery or new research that the security community would value, or enjoy hearing about, we invite you to submit your presentation topic for serious consideration. Preference will be given to speakers who can present new and innovative technical content to a broad audience. Of course, all presentations are expected to challenge the brightest and quickest of attendees - we wouldn't have it any other way. &lt;br /&gt;
&lt;br /&gt;
OWASP is not a vendor fair. Consequently, there will be very little tolerance for commercial content within presentations. Attendees will be encouraged to quell any shameless marketing that is not immediately backed up with rationale for its inclusion. &lt;br /&gt;
&lt;br /&gt;
Some topics of interest for upcoming meetings include (but are not limited to):&lt;br /&gt;
* Agile Software Development and Security&lt;br /&gt;
* Breaking CAPTCHA&lt;br /&gt;
* Hacking Cardspace and Identity 2.0&lt;br /&gt;
* Breaking Commercial Software for Fun and Profit&lt;br /&gt;
* Tactics for breaking software licensing schemes&lt;br /&gt;
* Gaming, the next overlooked security hole&lt;br /&gt;
* Hacking Mainframes/RACF&lt;br /&gt;
* Database rootkits&lt;br /&gt;
* PCI/DSS Compliance&lt;br /&gt;
* Privacy considerations in software development&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''Agenda: Thursday, December 3rd 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
SOCIAL MEDIA, PRIVACY AND BREACHES&amp;lt;br&amp;gt;&lt;br /&gt;
Ian Glazer, Distinguished Industry Analyst [http://www.burtongroup.com/ Burton Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/e/e2/BG_PartneringPrivacy_Glazer%282%29.pptx here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
VANISH: MAKING DATA DISAPPEAR&amp;lt;br&amp;gt;&lt;br /&gt;
George Dobbs, Chief Architect [http://www.kofc.org/ Knights of Columbus]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/c/c7/Vanishing_Data_and_impacts_to_privacy.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, November 17th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ATTACK YOUR DATABASE BEFORE OTHERS DO&amp;lt;br&amp;gt;&lt;br /&gt;
Todd Desantis, Lead Sales Engineer [http://www.sentrigo.com/ Sentrigo]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, October 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE CONVERGENCE OF SECURITY AND PRIVACY: CLOUD COMPUTING&amp;lt;br&amp;gt;&lt;br /&gt;
Michael Waidner, Distinguished IBM Engineer and Security CTO [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, September 14th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OWASP: WHERE WE ARE AND WHERE WE ARE GOING&amp;lt;br&amp;gt;&lt;br /&gt;
Tom Brennan, OWASP Board Member [http://www.owasp.org/ OWASP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
WEB APPLICATION SECURITY ASSURANCE&amp;lt;br&amp;gt;&lt;br /&gt;
Gregory Gotta, SVP Security [http://www.ca.com/ CA]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE ANATOMY OF SECURITY DISASTERS&amp;lt;br&amp;gt;&lt;br /&gt;
Marcus Ranum, CSO of [http://www.tenablesecurity.com/ Tenable Security]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/3/32/Anatomy_of_security_disasters.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, April 30th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RECRUITING ELITE IT TALENT&amp;lt;br&amp;gt;&lt;br /&gt;
Jordan Haberfield (Agile Elephant), SVP of [http://www.systemoneservices.com/ System One]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
DETECTING BACKDOORS IN WEB APPLICATIONS&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Wysopal CTO, [http://www.veracode.com/ Veracode]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Monday, April 13th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
AGILE SOFTWARE DEVELOPMENT AND SECURITY: 4:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Scott Ambler, Agile Practice Leader, [http://www.ibm.com/ IBM]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [http://www.owasp.org/images/f/f1/Ambler_Agile_Security_2009_04_14.pdf here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Tuesday, February 10th 2009'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
OPEN SOURCE IDENTITY SERVICES (The Higgins Project)&amp;lt;br&amp;gt;&lt;br /&gt;
Mary Ruddy, [http://www.meristic.com/index.php Meristic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
ENABLING STRONGER/MULTI-FACTOR AUTHENTICATION FOR ENTERPRISE APPLICATIONS &amp;lt;br&amp;gt;&lt;br /&gt;
Ramesh Nagappan, Security Architect at [http://www.sun.com/ Sun Microsystems]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
STATE OF WEB APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Gunnar Peterson, CTO of [http://www.artecgroup.net/ Artec Group] and Twin Cities OWASP &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, November 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
LIGHTWEIGHT SECURITY USING IDENTITY-BASED ENCRYPTION: 6:00 - 7:00 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Richard Eisenberg, Architect at [http://www.voltage.com/ Voltage Security]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, September 24th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
TOP TEN BOGUS TECH QUOTES OF THE YEAR: 6:00 - 6:45 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Paul Roberts, Industry Analyst, [http://www.the451group.com/ The 451 Group]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/c/c6/OWASP-Hartford-Oct08-451Group.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
MAKING APPLICATIONS SECURE BY REMOVING SECURITY: 6:45 - 7:30 PM&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Stone, Senior Manager, [http://www.accenture.com/ Accenture]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint presentation is located [https://www.owasp.org/images/0/01/OWASP-Hartford-Oct08-Accenture.ppt here]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, June 11th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
CARDSPACE AND USER CENTRIC IDENTITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chris Winn, Security Evangelist, [http://www.microsoft.com/ Microsoft]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
IDENTITY GOVERNANCE FRAMEWORK&amp;lt;br&amp;gt;&lt;br /&gt;
Prateek Mishra, Product Manager, [http://www.oracle.com/ Oracle]&amp;lt;br&amp;gt;&lt;br /&gt;
Powerpoint Presentation is [https://www.owasp.org/images/2/2c/IGF-Overview-Hartford-May-00.ppt here ]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Wednesday, April 30th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
THE IDIOTS GUIDE TO DEVELOPING BAD ENTERPRISE APPLICATIONS AND WORST LOGGING PRACTICES&amp;lt;br&amp;gt;&lt;br /&gt;
Anton Chuvakin, Chief Logging Evangelist, [http://www.loglogic.com/ LogLogic]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
KEEPING SECRETS: APPLICATION SECURITY IS A BUSINESS IMPERATIVE&amp;lt;br&amp;gt;&lt;br /&gt;
Jack Danahy, CTO and Founder, [http://www.ouncelabs.com/ Ounce Labs]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda: Thursday, February 28th 2008'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
HOW WEB 2.0 HAS CHANGED THE LANDSCAPE OF APPLICATION SECURITY&amp;lt;br&amp;gt;&lt;br /&gt;
Chenxi Wang, Principal Analyst, [http://www.forrester.com/ Forrester Research]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
EXPLOITING ONLINE GAMES&amp;lt;br&amp;gt;&lt;br /&gt;
Gary McGraw, CTO,  [http://www.cigital.com/ Cigital]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Locations ==&lt;br /&gt;
&lt;br /&gt;
All meetings are held at the headquarters of [http://www.thehartford.com/ The Hartford Financial Services Group] (The Hartford), One Hartford Plaza, Hartford CT 06115 in the Tower Building, Atrium Conference Room. Free parking is available in our Tower Ramp Garage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Hartford&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Connecticut]]&lt;/div&gt;</summary>
		<author><name>Jm04469</name></author>	</entry>

	</feed>