<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Goodwin</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Michael+Goodwin"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Michael_Goodwin"/>
		<updated>2026-04-22T12:21:08Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252719</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252719"/>
				<updated>2019-06-30T12:19:16Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: update roadmap progress&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required - '''complete: Confirmed JointJs works fine, Storage model changed and addition of Electon based desktop variant. Nools rule engine (no longer supported) replaced by [https://github.com/cachecontrol/json-rules-engine json-rules-engine]. Shifted from Grunt/Bower to NPM/Browserify'''&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback - '''Some progress on this. The desktop app has had 13k downloads - unclear how many people are actually using it. The GH repo for the desktop version has 79 stars. The web version gets about 94 unique visitors per day on average and the GH repo has 229 stars.'''&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release - '''Implemented some feature requests (e.g. snap-to-grid) and fixed issues reports (e.g. save bugs) by users'''&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagramming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
Following an architecture review the following key changes were made:&lt;br /&gt;
&lt;br /&gt;
* A new Electron based, installable desktop variant was introduced using the local file system for model storage&lt;br /&gt;
* The web variant was changed to use GitHub for model storage - other source control systems will follow (e.g. BitBucket)&lt;br /&gt;
* Seperation of common code into a new NPM package, shared between the web and desktop variants&lt;br /&gt;
* The Nools rule engine will be replaced since it is no longer maintained&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially to support deeper GitHub/BitBucket/Etc. integration&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org/&lt;br /&gt;
&lt;br /&gt;
The desktop variant (for Windows and OSX) can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon-desktop/releases&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
[http://mike-goodwin.github.io/owasp-threat-dragon/ http://docs.threatdragon.org/]&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
4) An installable, cross-platform desktop version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252718</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252718"/>
				<updated>2019-06-30T12:14:25Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: update roadmap progress&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required - '''complete: Confirmed JointJs works fine, Storage model changed and addition of Electon based desktop variant. Nools rule engine (no longer supported) replaced by [https://github.com/cachecontrol/json-rules-engine json-rules-engine]. Shifted from Grunt/Bower to NPM/Browserify'''&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release - '''Implemented some feature requests (e.g. snap-to-grid) and fixed issues reports (e.g. save bugs) by users'''&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagramming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
Following an architecture review the following key changes were made:&lt;br /&gt;
&lt;br /&gt;
* A new Electron based, installable desktop variant was introduced using the local file system for model storage&lt;br /&gt;
* The web variant was changed to use GitHub for model storage - other source control systems will follow (e.g. BitBucket)&lt;br /&gt;
* Seperation of common code into a new NPM package, shared between the web and desktop variants&lt;br /&gt;
* The Nools rule engine will be replaced since it is no longer maintained&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially to support deeper GitHub/BitBucket/Etc. integration&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org/&lt;br /&gt;
&lt;br /&gt;
The desktop variant (for Windows and OSX) can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon-desktop/releases&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
[http://mike-goodwin.github.io/owasp-threat-dragon/ http://docs.threatdragon.org/]&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
4) An installable, cross-platform desktop version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252717</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=252717"/>
				<updated>2019-06-30T12:11:28Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: updated roadmap progress&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required - '''complete: Confirmed JointJs works fine, Storage model changed and addition of Electon based desktop variant. Nools rule engine (no longer supported) replaced by [https://github.com/cachecontrol/json-rules-engine json-rules-engine]. Shifted from Grunt/Bower to NPM/Browserify'''&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagramming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
Following an architecture review the following key changes were made:&lt;br /&gt;
&lt;br /&gt;
* A new Electron based, installable desktop variant was introduced using the local file system for model storage&lt;br /&gt;
* The web variant was changed to use GitHub for model storage - other source control systems will follow (e.g. BitBucket)&lt;br /&gt;
* Seperation of common code into a new NPM package, shared between the web and desktop variants&lt;br /&gt;
* The Nools rule engine will be replaced since it is no longer maintained&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially to support deeper GitHub/BitBucket/Etc. integration&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org/&lt;br /&gt;
&lt;br /&gt;
The desktop variant (for Windows and OSX) can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon-desktop/releases&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
[http://mike-goodwin.github.io/owasp-threat-dragon/ http://docs.threatdragon.org/]&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
4) An installable, cross-platform desktop version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237237</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237237"/>
				<updated>2018-02-02T20:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: added file download&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Next event to be announced soon. &lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/11/2018 from 18:00 to 21:00 at  Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Modern_DevOps_and_security.pptx&amp;diff=237236</id>
		<title>File:Modern DevOps and security.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Modern_DevOps_and_security.pptx&amp;diff=237236"/>
				<updated>2018-02-02T20:25:49Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233735</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233735"/>
				<updated>2017-09-25T15:58:34Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: added last event to past history plus presentation links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
TBC - watch this space! Expected December 2017 or January 2018.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Security_Shepherd.pptx&amp;diff=233734</id>
		<title>File:Security Shepherd.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Security_Shepherd.pptx&amp;diff=233734"/>
				<updated>2017-09-25T15:57:04Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: Secuirty Shepherd presentation from OWASP Newcastle UK meetup Sept 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Secuirty Shepherd presentation from OWASP Newcastle UK meetup Sept 2017&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_threat_dragon_201709_.pptx&amp;diff=233733</id>
		<title>File:Owasp threat dragon 201709 .pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_threat_dragon_201709_.pptx&amp;diff=233733"/>
				<updated>2017-09-25T15:54:18Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: OWASP Threat Dragon Talk from Newcastle UK Chapter Meeting Sept 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Threat Dragon Talk from Newcastle UK Chapter Meeting Sept 2017&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233732</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233732"/>
				<updated>2017-09-25T15:43:55Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: Added Andi Pannell&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting is on '''Tuesday 19th September from 18:00 to 21:00 at CCE1 building, City Campus East, Northumbria University.'''&lt;br /&gt;
&lt;br /&gt;
We are using our traditional &amp;quot;talk-pizza-talk&amp;quot; format, looking at two OWASP projects - one flagship and one incubator. [https://www.eventbrite.com/e/owasp-newcastle-september-2017-meetup-tickets-37697692814 Registration] is optional but it helps us get the pizza order right.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Gareth Dixon'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective.&lt;br /&gt;
&lt;br /&gt;
'''Pizza and networking'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=232939</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=232939"/>
				<updated>2017-09-06T16:14:52Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: added registration link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting is on '''Tuesday 19th September from 18:00 to 21:00 at CCE1 building, City Campus East, Northumbria University.'''&lt;br /&gt;
&lt;br /&gt;
We are using our traditional &amp;quot;talk-pizza-talk&amp;quot; format, looking at two OWASP projects - one flagship and one incubator. [https://www.eventbrite.com/e/owasp-newcastle-september-2017-meetup-tickets-37697692814 Registration] is optional but it helps us get the pizza order right.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Gareth Dixon'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective.&lt;br /&gt;
&lt;br /&gt;
'''Pizza and networking'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=232938</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=232938"/>
				<updated>2017-09-06T15:31:07Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: added next meeting details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting is on '''Tuesday 19th September from 18:00 to 21:00 at CCE1 building, City Campus East, Northumbria University.'''&lt;br /&gt;
&lt;br /&gt;
We are using our traditional &amp;quot;talk-pizza-talk&amp;quot; format, looking at two OWASP projects - one flagship and one incubator.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Gareth Dixon'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective.&lt;br /&gt;
&lt;br /&gt;
'''Pizza and networking'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=230619</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=230619"/>
				<updated>2017-06-14T10:56:41Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: Updated following architecture review&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required - '''complete: Confirmed JointJs works fine, Storage model changed and addition of Electon based desktop variant. TBC replacement for Nools rule engine, since it is no longer maintained, shift from Grunt/Bower to NPM/Browserify'''&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagramming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
Following an architecture review the following key changes were made:&lt;br /&gt;
&lt;br /&gt;
* A new Electron based, installable desktop variant was introduced using the local file system for model storage&lt;br /&gt;
* The web variant was changed to use GitHub for model storage - other source control systems will follow (e.g. BitBucket)&lt;br /&gt;
* Seperation of common code into a new NPM package, shared between the web and desktop variants&lt;br /&gt;
* The Nools rule engine will be replaced since it is no longer maintained&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially to support deeper GitHub/BitBucket/Etc. integration&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org/&lt;br /&gt;
&lt;br /&gt;
The desktop variant (for Windows and OSX) can be downloaded from:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon-desktop/releases&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
[http://mike-goodwin.github.io/owasp-threat-dragon/ http://docs.threatdragon.org/]&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
4) An installable, cross-platform desktop version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=229148</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=229148"/>
				<updated>2017-04-25T21:34:59Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: fixed broken link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.org&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209671</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209671"/>
				<updated>2016-02-25T22:09:26Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* Robin Fewster&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209670</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209670"/>
				<updated>2016-02-25T22:04:59Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* Robin Fewster&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209669</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=209669"/>
				<updated>2016-02-25T21:51:02Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Chapter Leaders */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205067</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205067"/>
				<updated>2015-12-12T14:48:02Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205066</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205066"/>
				<updated>2015-12-12T14:42:34Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.org/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205065</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=205065"/>
				<updated>2015-12-12T14:41:44Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://docs.threatdragon.org&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx&amp;diff=204091</id>
		<title>File:OWASPNewcastle automated security testing using ZAP API.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx&amp;diff=204091"/>
				<updated>2015-11-30T22:02:28Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: Michael Goodwin uploaded a new version of &amp;amp;quot;File:OWASPNewcastle automated security testing using ZAP API.pptx&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx&amp;diff=204090</id>
		<title>File:OWASPNewcastle automated security testing using ZAP API.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx&amp;diff=204090"/>
				<updated>2015-11-30T22:01:12Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204089</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204089"/>
				<updated>2015-11-30T22:00:48Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204088</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204088"/>
				<updated>2015-11-30T21:54:42Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
Presentation coming soon!&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_the_problem_with_proving_identity.pptx&amp;diff=204087</id>
		<title>File:OWASPNewcastle the problem with proving identity.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPNewcastle_the_problem_with_proving_identity.pptx&amp;diff=204087"/>
				<updated>2015-11-30T21:54:04Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owaspnewcastle-real_world_defence_in_depth.pptx&amp;diff=204086</id>
		<title>File:Owaspnewcastle-real world defence in depth.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owaspnewcastle-real_world_defence_in_depth.pptx&amp;diff=204086"/>
				<updated>2015-11-30T21:51:11Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204085</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=204085"/>
				<updated>2015-11-30T21:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run in January 2016, date and time to be confirmed and we might have a new and exciting location! We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203918</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203918"/>
				<updated>2015-11-27T21:28:48Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Roadmap */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master Codecov report]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/ GitHub pages]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203917</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203917"/>
				<updated>2015-11-27T21:24:39Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete: [https://codecov.io/github/mike-goodwin/owasp-threat-dragon?branch=master]'''&lt;br /&gt;
* Draft end user documentation - '''complete: [http://mike-goodwin.github.io/owasp-threat-dragon/]'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203916</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203916"/>
				<updated>2015-11-27T21:17:15Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - '''complete'''&lt;br /&gt;
* Draft end user documentation - '''complete'''&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203915</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203915"/>
				<updated>2015-11-27T21:16:48Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Road Map and Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual) - complete&lt;br /&gt;
* Draft end user documentation - complete&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203856</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203856"/>
				<updated>2015-11-25T21:10:50Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Beta testers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual)&lt;br /&gt;
* Draft end user documentation&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Alpha testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
To help you get started, take a look at the (draft) docs:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
If you are still having problems, let me know and I will be pleased to help (mike.goodwin@owasp.org). All feedback is ''very'' welcome. Either email me or put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203855</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203855"/>
				<updated>2015-11-25T21:05:18Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Getting Involved */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual)&lt;br /&gt;
* Draft end user documentation&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
===Beta testers===&lt;br /&gt;
&lt;br /&gt;
Great user experience is one of the key goals for the project and to get that right it needs some users! If you would like to try the tool out, that would be great. A working prototype can be found at:&lt;br /&gt;
&lt;br /&gt;
http://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
All feedback is ''very'' welcome. Either email me (mike.goodwin@owasp.org) of put an issue on GitHub&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon/issues&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
Coding help of any kind is always welcome. The project builds easily (let me know if you have any problems) so getting up and running should be simple. &lt;br /&gt;
&lt;br /&gt;
===Threat rule engine===&lt;br /&gt;
&lt;br /&gt;
If you are not into javascript, you can still help! We need to build a powerful threat generation rule engine to replace the stubbed one that is in place for the prototype. If you can contribute in this area by defining rule, that would be great.&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203852</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=203852"/>
				<updated>2015-11-25T20:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
You can click here to see a working prototype:&lt;br /&gt;
&lt;br /&gt;
https://threatdragon.azurewebsites.net/&lt;br /&gt;
&lt;br /&gt;
And (draft) end-user documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
http://mike-goodwin.github.io/owasp-threat-dragon/&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual)&lt;br /&gt;
* Draft end user documentation&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=202928</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=202928"/>
				<updated>2015-11-02T10:55:45Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.&lt;br /&gt;
&lt;br /&gt;
The long talk is by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
The short talks are:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.&lt;br /&gt;
&lt;br /&gt;
The long talk is by Ben Lee (plus possibly a 2nd co-speaker). The title of Ben's talk is TBC. The short talks are:&lt;br /&gt;
&lt;br /&gt;
* Colin Watson - Think about the Top 10 Controls, not the Top 10 Risk&lt;br /&gt;
&lt;br /&gt;
* Michael Haselhurst - Automated Security Testing Using The ZAP API&lt;br /&gt;
&lt;br /&gt;
* Mike Goodwin - Real world defence in depth (part 1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2016 will be on January 26th from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=201941</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=201941"/>
				<updated>2015-10-10T20:43:27Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
And you can click here to see [https://threatdragon.azurewebsites.net/ a working prototype].&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual)&lt;br /&gt;
* Draft end user documentation&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=201936</id>
		<title>OWASP Threat Dragon</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Threat_Dragon&amp;diff=201936"/>
				<updated>2015-10-09T21:10:08Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Project Resources */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
==OWASP Threat Dragon Project==&lt;br /&gt;
An online threat modelling web application including system diagramming and a rule engine to auto-generate threats/mitigations. The focus will be on great UX a powerful rule engine and alignment with other development lifecycle tools.&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Threat modelling is widely regarded as a powerful way to build security into the design of applications early in the development lifecycle. At its best, it is especially good for &lt;br /&gt;
&lt;br /&gt;
* Ensuring defence-in-depth&lt;br /&gt;
* Establishing consistent security design patterns across an application&lt;br /&gt;
* Flushing out security requirements and user stories&lt;br /&gt;
&lt;br /&gt;
However, effective adoption by organisations can be difficult. Reasons for this include:&lt;br /&gt;
&lt;br /&gt;
* There are no cross-platform, free tools (that I am aware of)&lt;br /&gt;
* The usability of existing tools is not great - productivity for the team is therefore poor, especially in the early stages of adoption&lt;br /&gt;
* The learning curve for teams is steep - threat modelling often ends up being left to a small &amp;quot;expert&amp;quot; subset of a team and ignores the valuable perspectives from the wider team&lt;br /&gt;
* Integration with other development lifecycle tools (e.g. issue tracking tools) is poor - leading to models being ignored&lt;br /&gt;
&lt;br /&gt;
OWASP Threat Dragon will address this by providing a free, open-source, threat modelling web application for teams implementing the STRIDE approach. The key areas of focus for the tool will be:&lt;br /&gt;
&lt;br /&gt;
* '''Great UX''' - using Threat Dragon should be simple, engaging and fun&lt;br /&gt;
* '''A powerful threat/mitigation rule engine''' - this will lower the barrier to entry for teams and allow non-specialists to contribute&lt;br /&gt;
* '''Integration points with other development lifecycle tools''' - this will ensure that models slot easily into the development lifecycle and remain relevant as the project evolves&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.apache.org/licenses/LICENSE-2.0 Apache 2.0 License] &lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
The source code for the project can be found here:&lt;br /&gt;
&lt;br /&gt;
https://github.com/mike-goodwin/owasp-threat-dragon&lt;br /&gt;
&lt;br /&gt;
And you can click here to see [https://babydragon.azurewebsites.net/ a working prototype].&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
'''Q1:''' Hold on...isn't this the same as [https://github.com/mozilla/seasponge Mozilla's SeaSponge]?&lt;br /&gt;
&lt;br /&gt;
'''A1:''' As I was working on prototyping this, mostly as a way of getting myself properly up to speed with javascript, I found out about SeaSponge via the OWASP leaders mailing list. SeaSponge has a lot in common with this project and I based my implementation of the threat model file download feature on theirs. Maybe they could be merged in the future? Who knows?&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
'''Vision for the project:'''&lt;br /&gt;
&lt;br /&gt;
The overall vision for the project is to implement a tool that removes as many barriers as possible for organisations wanting to embed threat modelling into their development lifecycle. Barriers I have seen are:&lt;br /&gt;
&lt;br /&gt;
* Lack of cross platform tooling: Tool needs to be x-platform&lt;br /&gt;
* Poor UX in existing tools, productivity is poor: Great UX is a must&lt;br /&gt;
* Steep learning curve for adopting teams: Tool to build in expert knowledge to help the team get started&lt;br /&gt;
* Models are ignored: Integration with other lifecycle tools is key&lt;br /&gt;
&lt;br /&gt;
'''Initial high level plan:'''&lt;br /&gt;
&lt;br /&gt;
Milestone 1: Alpha release - Basic threat modelling experience&lt;br /&gt;
&lt;br /&gt;
* Architecture review of the existing prototype with refinement/change where required&lt;br /&gt;
* Secure design review and implementation of findings&lt;br /&gt;
* Development of tests (unit and manual)&lt;br /&gt;
* Draft end user documentation&lt;br /&gt;
* &amp;quot;Publicity drive&amp;quot; to sign up alpha/beta users and generate feedback&lt;br /&gt;
&lt;br /&gt;
Milestone 2: Beta release - Threat/mitigation rule engine&lt;br /&gt;
&lt;br /&gt;
* Refinement of UX based on feedback from the alpha release&lt;br /&gt;
* (Some) feature enhancements based on feedback from the alpha release&lt;br /&gt;
* Implementation of a rule engine for generation of threats/mitigations&lt;br /&gt;
* Updated tests and end-user documentation&lt;br /&gt;
&lt;br /&gt;
Milestone 3: Release 1&lt;br /&gt;
&lt;br /&gt;
* Key refinements, bug fixes and new features based on feedback from the beta release&lt;br /&gt;
* Complete end user documentation&lt;br /&gt;
* Penetration test&lt;br /&gt;
&lt;br /&gt;
Milestone 4 - Dev lifecycle integration&lt;br /&gt;
&lt;br /&gt;
* Detailed scope to be defined, but in general the vision is to support hooks into issue tracking and requirements management tool so that threats/mitigations can be tracked through to implementation and test&lt;br /&gt;
&lt;br /&gt;
'''Timeframes'''&lt;br /&gt;
&lt;br /&gt;
This is hard to estimate as it could change a lot if there were other developers involved. Based on my current velocity with just me, I would say release 1 could be complete in 1 year (optimistically).&lt;br /&gt;
&lt;br /&gt;
'''Technology'''&lt;br /&gt;
&lt;br /&gt;
The technical architecture is javascript from top to bottom. In the client the key libraries are Angular for the MVC architecture and JointJS for the diagraming. JointJS has a log of great features, but is not a perfect fit for Angular. This needs a review. In the prototype, all storage is done on the client using browser local storage.&lt;br /&gt;
&lt;br /&gt;
There is nothing on the server side at the moment in the prototype. Areas where this might become necessary are&lt;br /&gt;
&lt;br /&gt;
* If the threat rule engine requires too much power to run feasibly on the client&lt;br /&gt;
* Supporting hooks in to other dev lifecycle tools&lt;br /&gt;
&lt;br /&gt;
If needed I plan to use node.js on the server so that the rule engine can be flexible enough to run either client or server side.&lt;br /&gt;
&lt;br /&gt;
Server-side storage has not been needed yet. If it becomes necessary, then a review of options will be needed to find a way to do this that is sustainable and consistent with the open source approach for the project.&lt;br /&gt;
&lt;br /&gt;
'''Challenges'''&lt;br /&gt;
&lt;br /&gt;
* Getting enough usage of the alpha and beta to get the UX and rule engine right&lt;br /&gt;
* Finding a sustainable way to host it, especially if it needs any kind of server side storage or processing - the prototype today just serves static content and all the logic is on the client side&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&lt;br /&gt;
1) Application source code for a threat modeling tool&lt;br /&gt;
&lt;br /&gt;
2) End user documentation for the tool&lt;br /&gt;
&lt;br /&gt;
3) An online hosted version of the tool&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201817</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201817"/>
				<updated>2015-10-08T11:11:00Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.&lt;br /&gt;
&lt;br /&gt;
The long talk is by '''Ben Lee''' (plus possibly a 2nd co-speaker). The title of Ben's talk is TBC.&lt;br /&gt;
&lt;br /&gt;
The short talks are:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. This is the fifth meeting of the Newcastle OWASP chapter. Like the last meeting, we are again having 3 short talks and 1 longer talk.&lt;br /&gt;
&lt;br /&gt;
The long talk is by Ben Lee (plus possibly a 2nd co-speaker). The title of Ben's talk is TBC. The short talks are:&lt;br /&gt;
&lt;br /&gt;
* Colin Watson - Think about the Top 10 Controls, not the Top 10 Risk&lt;br /&gt;
&lt;br /&gt;
* Michael Haselhurst - Automated Security Testing Using The ZAP API&lt;br /&gt;
&lt;br /&gt;
* Mike Goodwin - Real world defence in depth (part 1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The first meeting of 2016 will be on January 26th from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We have two great talks in mind, but they are not 100% confirmed. Details TBC so watch this space.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201816</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201816"/>
				<updated>2015-10-08T09:57:54Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Local Organisations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Talks TBC&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers TBC.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201395</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201395"/>
				<updated>2015-10-01T08:29:19Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Talks TBC&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers TBC.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:CSP_Newcastle_Chapter_Sept_2015.pdf&amp;diff=201394</id>
		<title>File:CSP Newcastle Chapter Sept 2015.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:CSP_Newcastle_Chapter_Sept_2015.pdf&amp;diff=201394"/>
				<updated>2015-10-01T08:28:10Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201393</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201393"/>
				<updated>2015-10-01T08:24:39Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Talks TBC&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers TBC.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on [https://speakerdeck.com/ianoxley/content-security-policy| Content Security Policy] (short talk)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201324</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201324"/>
				<updated>2015-09-30T12:54:37Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Talks TBC&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers TBC.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) (awaiting slides)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201323</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201323"/>
				<updated>2015-09-30T12:52:43Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk&lt;br /&gt;
&lt;br /&gt;
We are still looking for a speaker for the long talk, but the short sessions are&lt;br /&gt;
&lt;br /&gt;
* John Beddard on Securing Real-Time Networks&lt;br /&gt;
* Ian Oxley on Content Security Policy&lt;br /&gt;
* Mike Goodwin talking about his OWASP threat modelling tool project&lt;br /&gt;
* Neil Dixley on 'OWASP Top 10 Mobile Risks'&lt;br /&gt;
&lt;br /&gt;
If you would like to volunteer to speak at this or any future meetings, please get in contact with the chapter leaders - you would be very welcome!&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers TBC.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) (awaiting slides)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201322</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201322"/>
				<updated>2015-09-30T12:32:09Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk&lt;br /&gt;
&lt;br /&gt;
We are still looking for a speaker for the long talk, but the short sessions are&lt;br /&gt;
&lt;br /&gt;
* John Beddard on Securing Real-Time Networks&lt;br /&gt;
* Ian Oxley on Content Security Policy&lt;br /&gt;
* Mike Goodwin talking about his OWASP threat modelling tool project&lt;br /&gt;
* Neil Dixley on 'OWASP Top 10 Mobile Risks'&lt;br /&gt;
&lt;br /&gt;
If you would like to volunteer to speak at this or any future meetings, please get in contact with the chapter leaders - you would be very welcome!&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
This is the Fourth Meeting of the Newcastle Chapter.&lt;br /&gt;
&lt;br /&gt;
We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
The talks are as follows:&lt;br /&gt;
&lt;br /&gt;
18:00 - 18:20 John Beddard on Securing Real-Time Networks which should prove extremely interesting given the amount of sysops we have!&lt;br /&gt;
&lt;br /&gt;
18:20 - 18:40 Ian Oxley on Content Security Policy &lt;br /&gt;
&lt;br /&gt;
18:40 - 19:00 Mike Goodwin talking about his OWASP threat modelling tool project.&lt;br /&gt;
&lt;br /&gt;
19:00 - 20:00 Pizza!&lt;br /&gt;
&lt;br /&gt;
20:00 - 21:00 Neil Dixley on 'OWASP Top 10 Mobile Risks': An introduction to using the OWASP top 10 for mobile risks for secure mobile development, including an overview of the OWASP Mobile Security Project and how you can participate.&lt;br /&gt;
&lt;br /&gt;
Everyone is free to attend.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) (awaiting slides)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201321</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201321"/>
				<updated>2015-09-30T12:29:40Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk&lt;br /&gt;
&lt;br /&gt;
We are still looking for a speaker for the long talk, but the short sessions are&lt;br /&gt;
&lt;br /&gt;
* John Beddard on Securing Real-Time Networks&lt;br /&gt;
* Ian Oxley on Content Security Policy&lt;br /&gt;
* Mike Goodwin talking about his OWASP threat modelling tool project&lt;br /&gt;
* Neil Dixley on 'OWASP Top 10 Mobile Risks'&lt;br /&gt;
&lt;br /&gt;
If you would like to volunteer to speak at this or any future meetings, please get in contact with the chapter leaders - you would be very welcome!&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
This is the Fourth Meeting of the Newcastle Chapter.&lt;br /&gt;
&lt;br /&gt;
We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
The talks are as follows:&lt;br /&gt;
&lt;br /&gt;
18:00 - 18:20 John Beddard on Securing Real-Time Networks which should prove extremely interesting given the amount of sysops we have!&lt;br /&gt;
&lt;br /&gt;
18:20 - 18:40 Ian Oxley on Content Security Policy &lt;br /&gt;
&lt;br /&gt;
18:40 - 19:00 Mike Goodwin talking about his OWASP threat modelling tool project.&lt;br /&gt;
&lt;br /&gt;
19:00 - 20:00 Pizza!&lt;br /&gt;
&lt;br /&gt;
20:00 - 21:00 Neil Dixley on 'OWASP Top 10 Mobile Risks': An introduction to using the OWASP top 10 for mobile risks for secure mobile development, including an overview of the OWASP Mobile Security Project and how you can participate.&lt;br /&gt;
&lt;br /&gt;
Everyone is free to attend.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) (awaiting slides)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201320</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=201320"/>
				<updated>2015-09-30T12:29:13Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk&lt;br /&gt;
&lt;br /&gt;
We are still looking for a speaker for the long talk, but the short sessions are&lt;br /&gt;
&lt;br /&gt;
* John Beddard on Securing Real-Time Networks&lt;br /&gt;
* Ian Oxley on Content Security Policy&lt;br /&gt;
* Mike Goodwin talking about his OWASP threat modelling tool project&lt;br /&gt;
* Neil Dixley on 'OWASP Top 10 Mobile Risks'&lt;br /&gt;
&lt;br /&gt;
If you would like to volunteer to speak at this or any future meetings, please get in contact with the chapter leaders - you would be very welcome!&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next event will be run on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
This is the Fourth Meeting of the Newcastle Chapter.&lt;br /&gt;
&lt;br /&gt;
We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk.&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
The talks are as follows:&lt;br /&gt;
&lt;br /&gt;
18:00 - 18:20 John Beddard on Securing Real-Time Networks which should prove extremely interesting given the amount of sysops we have!&lt;br /&gt;
&lt;br /&gt;
18:20 - 18:40 Ian Oxley on Content Security Policy &lt;br /&gt;
&lt;br /&gt;
18:40 - 19:00 Mike Goodwin talking about his OWASP threat modelling tool project.&lt;br /&gt;
&lt;br /&gt;
19:00 - 20:00 Pizza!&lt;br /&gt;
&lt;br /&gt;
20:00 - 21:00 Neil Dixley on 'OWASP Top 10 Mobile Risks': An introduction to using the OWASP top 10 for mobile risks for secure mobile development, including an overview of the OWASP Mobile Security Project and how you can participate.&lt;br /&gt;
&lt;br /&gt;
Everyone is free to attend.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) (awaiting slides)&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:PassiveDefense_Newcastle_Chapter_Sept_2015.pdf&amp;diff=201319</id>
		<title>File:PassiveDefense Newcastle Chapter Sept 2015.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:PassiveDefense_Newcastle_Chapter_Sept_2015.pdf&amp;diff=201319"/>
				<updated>2015-09-30T12:28:05Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx&amp;diff=201318</id>
		<title>File:OWASP Threat Dragon Newcastle Chapter Sept 2015.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx&amp;diff=201318"/>
				<updated>2015-09-30T12:27:09Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx&amp;diff=201317</id>
		<title>File:OWASP Mobile Security Project Newcastle Chapter Sept 2015.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx&amp;diff=201317"/>
				<updated>2015-09-30T12:25:40Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=199425</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=199425"/>
				<updated>2015-08-24T11:25:43Z</updated>
		
		<summary type="html">&lt;p&gt;Michael Goodwin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr] and [mailto:mike.goodwin@owasp.org Mike Goodwin]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002. We are changing the format this time and having 3 small 20 minute talks, a refreshment break and then a single 60 minute talk&lt;br /&gt;
&lt;br /&gt;
We are still looking for a speaker for the long talk, but the short sessions are&lt;br /&gt;
&lt;br /&gt;
* John Beddard on Securing Real-Time Networks&lt;br /&gt;
* Ian Oxley on Content Security Policy&lt;br /&gt;
* Mike Goodwin talking about his OWASP threat modelling tool project&lt;br /&gt;
&lt;br /&gt;
If you would like to volunteer to speak at this or any future meetings, please get in contact with the chapter leaders - you would be very welcome!&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will take place on 28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Our speakers are '''Andrew Waite''' will be taking about '''&amp;quot;Honeypots; From Research to the Enterprise&amp;quot;''' and '''George Chlapoutakis''' talking about '''&amp;quot;Security in the World of Containerisation&amp;quot;'''.&lt;br /&gt;
&lt;br /&gt;
We are looking to host a meeting the final Tuesday of every second month.&lt;br /&gt;
&lt;br /&gt;
Please get in touch if you would like to speak at a Newcastle event - we would be delighted to hear from you.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
&lt;br /&gt;
Once the group is up and running we will be looking for more leaders.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman]. Their next meeting is on 22nd September at PricewaterhouseCoopers LLP, Central Square South, Orchard Street, Newcastle upon Tyne, NE1 3AZ&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events.&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Michael Goodwin</name></author>	</entry>

	</feed>