<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Leah+Teutsch</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Leah+Teutsch"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Leah_Teutsch"/>
		<updated>2026-04-24T06:54:25Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=87864</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=87864"/>
				<updated>2010-08-23T03:38:15Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
From Dallas:&lt;br /&gt;
Take 183-West to 114-West (Toward Grapevine)&lt;br /&gt;
Exit on Solana/Kirkwood Blvd&lt;br /&gt;
Turn Left onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
From Fort Worth:&lt;br /&gt;
Take I-35W North&lt;br /&gt;
Take exit 70 toward Dallas/Bridgeport/Tx-114&lt;br /&gt;
Turn Right onto 114 East&lt;br /&gt;
Exit on Solana Blvd&lt;br /&gt;
Turn Right onto Kirkwood Blvd&lt;br /&gt;
Turn Right onto Campus Circle (You will see the CoreLogic sign)&lt;br /&gt;
&lt;br /&gt;
Link to Directions &lt;br /&gt;
(Please Note:  CoreLogic (formerly First American) is still listed on Google Maps and other applications as “First American”)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. The Southlake conference room is located in Building 4, Floor 1. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=87715</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=87715"/>
				<updated>2010-08-17T23:04:35Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, September 21, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Securing the Smart Grid's Software&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Andy Bochman&lt;br /&gt;
&lt;br /&gt;
Andy Bochman is Energy Security Lead for IBM's Rational Division, where the focus is on securing the software that runs the Smart Grid.  Andy is a contributor to industry and national security working groups on energy security and cyber security. He lives in Boston, is an active member of the MIT Energy Club, and is the founder of the Smart Grid Security and DOD Energy Blogs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' CoreLogic, 1 CoreLogic Drive, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7. &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=85002</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=85002"/>
				<updated>2010-06-17T01:19:36Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Tuesday, June 29, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Protecting Your Applications from Backdoors: How to Security Your Business Critical &lt;br /&gt;
Applications from Time Bombs, BAckdoors &amp;amp; More&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
•    Prevalence of backdoors and malicious code in third party attacks &lt;br /&gt;
•    Definitions and classifications of backdoors and their impact on your applications &lt;br /&gt;
•    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Clint Pollock, Senior Solutions Architect, Veracode&lt;br /&gt;
&lt;br /&gt;
Mr. Pollock is a Senior Solutions Architect at Veracode. Since 1997, he has also created security solutions for large-scale enterprise environments on behalf of CREDANT Technologies and Netegrity.  In his current role, Clint helps globally distributed organizations evaluate, track, and mitigate their application security risk.  Clint’s greatest strengths are his enthusiasm, experience and determination to help customers succeed in maintaining secure, compliant systems, and avoid the consequences and bad headlines that come with application security breaches.  Clint resides in Chicago, IL.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - School of Management (SOM), Executive Dining Room A, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot M.  I will send a permit to those who have RSVP'd by Monday, June 29.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch or come early and purchase lunch at one of the many fast-food restaurants located on the top floor of the Student Union.  We are meeting in a differnt building than for previous meetings so be sure to check the on-line map for construction changes.  http://www.utdallas.edu/maps/ &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=83025</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=83025"/>
				<updated>2010-05-04T15:58:10Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, May 20, 2010 6:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Spring 2010 Networking Event - Network With Your Peers &lt;br /&gt;
&lt;br /&gt;
FREE EVENT!!!  Your Dallas OWASP Chapter is pleased to host a networking event open to all those involved in OWASP.  Our friends at Fortify Software are sponsoring this happy hour. &lt;br /&gt;
&lt;br /&gt;
• Mix and mingle with fellow OWASP chapter members • Bring your business cards and resume • Appetizers will be served, and drinks will be free • Enter to win prizes and great gifts (must be present to win)&lt;br /&gt;
&lt;br /&gt;
Dallas OWASP Website: http://www.owasp.org/index.php/Dallas &lt;br /&gt;
&lt;br /&gt;
Don't miss the first Spring 2010 Networking event!  We look forward to seeing you there!&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Humperdink's at Loop 12 and NW HWY, 2208 W NW Hwy,	Dallas, TX 75220, (214) 358-4159&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu] &lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=78966</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=78966"/>
				<updated>2010-02-25T23:03:47Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving &lt;br /&gt;
high-performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass. Place the permit on the dash.  &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=78965</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=78965"/>
				<updated>2010-02-25T21:51:43Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' Thursday, March 4, 2010 11:30 AM – 1:00 PM&lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Technology and Business Risk Management: How Application Security Fits In&lt;br /&gt;
&lt;br /&gt;
This presentation demonstrates how important application security is to the&lt;br /&gt;
overall stability and security of the infrastructure and the ultimately, the business. Presented from&lt;br /&gt;
the Information Security Officer/Risk Manager point of view, it shows how a strong information&lt;br /&gt;
security program reduces levels of reputational, operational, legal, and strategic risk by limiting&lt;br /&gt;
vulnerabilities, increasing stability, and maintaining customer confidence and trust. It focuses on&lt;br /&gt;
the top concerns of risk managers and how application security fits into the overall risk&lt;br /&gt;
management process. The audience will be given recommendations on how to improve cost&lt;br /&gt;
effectiveness and efficiency to achieve business, security, audit, and compliance objectives&lt;br /&gt;
relative to applications.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Peter Perfetti, IMPACT Security LLC&lt;br /&gt;
&lt;br /&gt;
Mr. Perfetti has been working in information security for fifteen years. He has&lt;br /&gt;
been involved in IT Security for the financial services industry for ten years where he has worked&lt;br /&gt;
as an Information Security Officer as well as having been responsible for vulnerability and threat&lt;br /&gt;
management, and security engineering. Mr. Perfetti worked for Viacom and MTV as the Manager&lt;br /&gt;
of Systems Administration and was the Director of IT Risk Management for the National&lt;br /&gt;
Basketball Association. He has a broad range of experience in both operations and security. Mr.&lt;br /&gt;
Perfetti provided governance and guidance over risk and compliance issues for the Americas&lt;br /&gt;
region of ABN AMRO as the Local Information Security Officer for New York. His responsibilities&lt;br /&gt;
were primarily to manage the risk for infrastructure related technology and operations. Other&lt;br /&gt;
duties included audit, business continuity, investigations, and security operations oversight. Most&lt;br /&gt;
recently, he was head of IT Security &amp;amp; Governance at Tygris Commercial Finance. He was&lt;br /&gt;
formerly the VP of the NY/NJ Metro Chapter of OWASP and is currently a board member of the&lt;br /&gt;
local chapter. He has served on the IT Security Advisory Board for the Technology Manager’s&lt;br /&gt;
Forum. Mr. Perfetti’s accomplishments have been discussed in two books on achieving high&lt;br /&gt;
performing, stable, and secure infrastructure. Currently Mr. Perfetti operates IMPACT Security&lt;br /&gt;
LLC, a private security contractor firm, that specializes in Incident &amp;amp; Audit Response, Prevention,&lt;br /&gt;
and Recovery; as well as developing, enhancing, and implementing Security and Risk&lt;br /&gt;
Management programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' University of Texas at Dallas Campus - Galaxy Room C of the Student Union, 800 W. Campbell Rd., Richardson, TX 75080&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Park in lot C.  I will send a permit to those who have RSVP'd by Tuesday, March 2nd.  Those who do not have the permit will need to stop at the Visitor Center on University Parkway to pick up a pass.   &lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at one of the many fast-food&lt;br /&gt;
restaurants located on the top floor of the Student Union.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=68735</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=68735"/>
				<updated>2009-09-11T21:50:19Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP Calendar [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** BOULDER: Every third Thursday of the month except Nov and Dec ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** SINGAPORE: Every first Thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Feb 10 (17:15h) - [http://www.owasp.org/index.php/Perth_Australia#Threat_Modelling_in_the_Software_Development_Lifecycle_.28Feb_2009.29 Perth Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''April 1 Boston OWASP Chapter meeting - Breaking Browsers - [http://www.owasp.org/index.php/boston Boston Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''September 15 (11:30 to 1:30 pm) Dallas OWASP Chapter meeting - Detective Work for Testers Finding Workflow-based Defects - [http://www.owasp.org/index.php/Dallas Dallas Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
=== 2008 ===&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (17:30h) -  [http://www.owasp.org/index.php/Netherlands#Announcement_December_11th_2008:_Architectural_and_design_risk_analysis Netherlands Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (17:30h) - [https://www.owasp.org/index.php/Denmark#Local_News Denmark Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 22nd-25th - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NY/NJ Metro]'''&lt;br /&gt;
&lt;br /&gt;
'''Aug 21 (18:00h) - [http://www.owasp.org/index.php/Boulder#Next_Meeting Boulder Chapter Meeting]'''&lt;br /&gt;
&lt;br /&gt;
==Past Events==&lt;br /&gt;
&lt;br /&gt;
'''Dec 11 (18:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 26 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:15h) - [[Helsinki|Helsinki chapter and RWSUG seminar]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 29 (11:30h) - [[Cincinnati|Cincinnati chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 20 (17:30h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 15 (11:00h) - [[Pune|Pune chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 12 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 6 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Dec 5 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Dec 3 (13:00h) - [[Israel|OWASP Israel 2007]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Seattle|Seattle Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 29 (18:00h) -[[Sacramento|Sacramento Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Nov 26 (09:30h) - [[Turkey|Turkey Chapter Meeting - Izmir]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 24 (13:30h) - [[Turkey|Turkey Chapter Meeting - Ankara]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 20 (18:00h) - [[Belgium|Belgium Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 14 (18:00h) - [[Houston|Houston Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 11 (18:00h) - [[Ireland|Ireland Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (18:00h) - [[Boston|Possible Boston OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 7 (19:00h) - [[Singapore|Singapore OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Nov 3 (18:30h) - [[Malaysia|Malaysia OWASP Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Oct 9 (19:30h) - [[Singapore|Singapore OWASP chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Oct 2 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (1800h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 27 (13:00h) - [[Taiwan|Taiwan chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 10 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 7 (15:00h) [[Germany|German chapter meeting]]''' - Restart of the German Chapter&lt;br /&gt;
&lt;br /&gt;
'''Sept (12:00h) - [[Belgium|Belgium OWASP Day Event]] '''&lt;br /&gt;
&lt;br /&gt;
'''Sept 6 (18:00h) - [[Kansas_City|Kansas City Chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[Chicago|Chicago Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (17:00h) - [[Israel|Israeli chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Sept 5 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 25 (18:00h) - [[San Jose|San Jose Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 24 (17:00h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 (11:00h) - [[Turkey|Turkey chapter meeting - 1st Web Security Days]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 6 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30h) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 22 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 21 (19:00h) - [[Denver]]''' - Anti-DNS Pinning Attacks / Calculating Return on Security Investment (ROSI)&lt;br /&gt;
&lt;br /&gt;
'''June 19 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00h) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 14 (08:00h) - [[Vietnam|Vietnam chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00h) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 - [[Melbourne | Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 - [[Boston]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 - [[Turkey]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 - [[Virginia (Northern Virginia)|Washington DC (VA)]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 - [[Toronto]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 - [[Belgium]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 - [[Rochester]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 - [[Israel]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 - [[New Zealand]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 - [[Italy]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Houston]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Melbourne]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 5 - [[Helsinki]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 - [[New Jersey]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 15 - [[Spain]]'''&lt;br /&gt;
&lt;br /&gt;
'''July 14 - [[Turkey]]'''&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68121</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68121"/>
				<updated>2009-08-27T20:12:44Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leaders are [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68120</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68120"/>
				<updated>2009-08-27T20:11:02Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68119</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68119"/>
				<updated>2009-08-27T20:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68118</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68118"/>
				<updated>2009-08-27T20:08:56Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A Link to Directions].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68117</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68117"/>
				<updated>2009-08-27T20:08:10Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68116</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68116"/>
				<updated>2009-08-27T20:07:39Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [mailto:OWASPDallas@utdallas.edu]  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68115</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68115"/>
				<updated>2009-08-27T20:07:02Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch], [mailto:andrea.wendeln@gmail.com Andrea Wendeln] and [mailto:Don.McMillian@acs-inc.com Don McMillian].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' OWASPDallas@utdallas.edu  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68114</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68114"/>
				<updated>2009-08-27T20:01:09Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' OWASPDallas@utdallas.edu  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68113</id>
		<title>Dallas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Dallas&amp;diff=68113"/>
				<updated>2009-08-27T19:56:06Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Dallas Chapter&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques.  Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation.  Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies.  Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' OWASPDallas@utdallas.edu  This will help expedite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
Dallas OWASP Chapter: February 2009 Meeting &lt;br /&gt;
&lt;br /&gt;
Topic: &amp;quot;Vulnerability Management in an Application Security World.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Presenter: Dan Cornell, Principal, Denim Group &lt;br /&gt;
&lt;br /&gt;
Date: February 25, 2009 11:30am – 1:30pm &lt;br /&gt;
&lt;br /&gt;
Location: &lt;br /&gt;
UTD Campus - Galaxy Room of the Student Union, Room SU 2.602&lt;br /&gt;
Doors open at 11:00 am.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
Presenter Bio: &lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
Please RSVP: OWASP.DFW.RSVP@denimgroup.com&lt;br /&gt;
&lt;br /&gt;
[[Dallas_OWASP_Flyer.pdf‎]]&lt;br /&gt;
&lt;br /&gt;
==== Dallas OWASP Chapter Leaders ====&lt;br /&gt;
The chapter leader is [mailto:teutsch@utdallas.edu Leah Teutsch]__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Chapter_Template&amp;diff=67979</id>
		<title>Template:Chapter Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Chapter_Template&amp;diff=67979"/>
				<updated>2009-08-24T22:50:47Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* Chapter Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leadership includes: [mailto:teutsch@utdallas.edu Leah Teutsch, Group Leader], [mailto:andrea.wendeln@gmail.com Andrea Wendeln, Group Leader] and [mailto:Don.McMillian@acs-inc.com Don McMillian, Group Leader.]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Chapter_Template&amp;diff=67978</id>
		<title>Template:Chapter Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Chapter_Template&amp;diff=67978"/>
				<updated>2009-08-24T22:45:54Z</updated>
		
		<summary type="html">&lt;p&gt;Leah Teutsch: /* OWASP {{{chaptername}}} Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Dallas|extra=The chapter leadership includes: [mailto:teutsch@utdallas.edu Leah Teutsch, Group Leader], [mailto:andrea.wendeln@gmail.com Andrea Wendeln, Group Leader] and [mailto:Don.McMillian@acs-inc.com Don McMillian, Group Leader.]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-dallas|emailarchives=http://lists.owasp.org/pipermail/owasp-dallas}}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When:''' September 15, 2009, 11:30am - 1:30pm &lt;br /&gt;
&lt;br /&gt;
'''Topic: ''' Detective Work for Testers.  Finding Workflow-based Defects.&lt;br /&gt;
&lt;br /&gt;
Workflow-based security defects in Web applications are especially difficult to identify because they evade traditional, point-and-scan vulnerability detection techniques. Understanding these potential defects and why black-box scanners typically miss them, are key to creating a testing strategy for successful detection and mitigation. Rafal Los describes the critical role that testers play in assessing application work flows and how business process-based testing techniques can uncover these flaws. Rafal demystifies the two main types of workflow-based application vulnerabilities-business process logic vulnerabilities and parameter-based vulnerabilities-and provides you with a sound basis to improve your testing strategies. Become a security testing sleuth and learn to find the workflow-based security defects before your system is compromised.&lt;br /&gt;
&lt;br /&gt;
'''Who:''' Rafal Los, Sr. Web Security Specialist, HP Software&lt;br /&gt;
&lt;br /&gt;
Senior Security Specialist with Hewlett-Packard’s Application Security Center (ASC), Rafal Los has more than thirteen years of experience in network and system design, security policy and process design, risk analysis, penetration testing, and consulting.  For the past eight years, he has focused on information security and risk management, leading security architecture teams, and managing successful enterprise security programs for General Electric and other Fortune 100 companies, as well as SMB enterprises. Previously, Rafal spent three years in-house with GE Consumer Finance, leading its web application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Where:''' The First American Co, 1 First American Way, Westlake, TX 76262 (@15 min from DFW Airport)&lt;br /&gt;
&lt;br /&gt;
'''Parking:''' Upon arrival at Circle Drive, please pull into the Visitor Kiosk to your right where you will be issued a Visitor’s Parking Pass.  Once parked, proceed to Building 5 for your Visitor Badge. See Map for Directions. [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=1+first+american+way,+westlake,+tx&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=48.641855,78.837891&amp;amp;ie=UTF8&amp;amp;mrt=rblall&amp;amp;ll=32.980777,-97.174437&amp;amp;spn=0.006336,0.009624&amp;amp;z=17&amp;amp;iwloc=A].&lt;br /&gt;
&lt;br /&gt;
'''Cost:''' Always Free&lt;br /&gt;
&lt;br /&gt;
'''Lunch:''' Bring your own lunch or purchase lunch at the First American Café in Building 7.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' OWASPDallas@utdallas.edu  This will help expidite the check-in process.  Thanks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''======================================================'''&lt;br /&gt;
&lt;br /&gt;
'''When:''' Dallas February 25, 2009 11:30am – 1:30pm&lt;br /&gt;
&lt;br /&gt;
'''Topic:'''  Vulnerability Management in an Application Security World.&lt;br /&gt;
Identifying application-level vulnerabilities via penetration tests and code reviews is only the first step in actually addressing the underlying risk. Managing vulnerabilities for applications is more challenging than dealing with traditional infrastructure-level vulnerabilities because they typically require the coordination of security teams with application development teams and require security managers to secure time from developers during already-cramped development and release schedules. In addition, fixes require changes to custom application code and application-specific business logic rather than the patches and configuration changes that are often sufficient to address infrastructure-level vulnerabilities. This presentation details many of the pitfalls organizations encounter while trying to manage application-level vulnerabilities as well as outlines strategies security teams can use for communicating with development teams. Similarities and differences between security teams’ practice of vulnerability management and development teams’ practice of defect management will be addressed in order to facilitate healthy communication between these groups. &lt;br /&gt;
&lt;br /&gt;
'''Who:'''  Dan Cornell, Principal, Denim Group &lt;br /&gt;
Dan Cornell has over ten years of experience architecting, developing and securing web-based software systems. As a Principal of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group application security research team, investigating the application of secure coding and development techniques to the improvement of web based software development methodologies. He is also the primary author of sprajax, Denim Group’s open source tool for assessing the security of AJAX-enabled web applications. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''  UTD Campus - Galaxy Room of the Student Union, Room SU 2.602 Doors open at 11:00 am. &lt;br /&gt;
&lt;br /&gt;
'''RSVP: '''  OWASP.DFW.RSVP@denimgroup.com&lt;/div&gt;</summary>
		<author><name>Leah Teutsch</name></author>	</entry>

	</feed>