<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owasp+birmingham</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Owasp+birmingham"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Owasp_birmingham"/>
		<updated>2026-05-22T02:12:53Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=204100</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=204100"/>
				<updated>2015-12-01T09:20:04Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Corrected date and location for next meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
16th December 2015&lt;br /&gt;
== Location ==&lt;br /&gt;
Aston Science Park&lt;br /&gt;
Faraday Wharf, &lt;br /&gt;
Holt St, &lt;br /&gt;
Birmingham B7 4BB&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at *watch this space*&lt;br /&gt;
&lt;br /&gt;
== Hackathon == &lt;br /&gt;
&lt;br /&gt;
This months Christmas special will be a little different from previous events.&lt;br /&gt;
&lt;br /&gt;
With the help of the guys from Pen Test Partners we will be having an IoT hackathon, so bring along a laptop.&lt;br /&gt;
&lt;br /&gt;
You will have the chance to investigate the security of a number of IoT devices such as the infamous iKettle, iCoffee and My Friend Kayla, as well as some some surprise devices. If you have an IoT device you'd like to take a look at, then feel free to bring it along.&lt;br /&gt;
&lt;br /&gt;
Tickets will be made available once the venue has confirmed our booking.&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
December 16th, Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203341</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203341"/>
				<updated>2015-11-13T09:00:11Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
2nd December 2015&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Museum&lt;br /&gt;
Millennium Point, Curzon St, &lt;br /&gt;
Birmingham, West Midlands B4 7XG&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at *watch this space*&lt;br /&gt;
&lt;br /&gt;
== Hackathon == &lt;br /&gt;
&lt;br /&gt;
This months Christmas special will be a little different from previous events.&lt;br /&gt;
&lt;br /&gt;
With the help of the guys from Pen Test Partners we will be having an IoT hackathon, so bring along a laptop.&lt;br /&gt;
&lt;br /&gt;
You will have the chance to investigate the security of a number of IoT devices such as the infamous iKettle, iCoffee and My Friend Kayla, as well as some some surprise devices. If you have an IoT device you'd like to take a look at, then feel free to bring it along.&lt;br /&gt;
&lt;br /&gt;
Tickets will be made available once the venue has confirmed our booking.&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
December 2nd, Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203340</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203340"/>
				<updated>2015-11-13T08:55:24Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at [http://owaspbrum.eventbrite.co.uk eventbrite]&lt;br /&gt;
&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. &lt;br /&gt;
&lt;br /&gt;
'''Windows Phone 7 platform and application security overview'''&lt;br /&gt;
&lt;br /&gt;
Windows Phone 7 is the latest mobile operating system from Microsoft and is the youngest of all the major smartphone operating systems. Since it was released in late 2010 it has gained a small share of the smartphone market but this is likely to increase significantly with Nokia now using it as the OS for their flagship models.&lt;br /&gt;
&lt;br /&gt;
The young age of the OS and the small market share size means there has been very little security research carried out against this platform so far. This means that developers and security professionals are working with this platform without a detailed understanding of the security features and potential shortcomings.&lt;br /&gt;
&lt;br /&gt;
Security should be part of the DNA of any application which stores or transmits sensitive data but how many of the developers with published applications understand common mobile application security vulnerabilities and more importantly how many know how to prevent them in their own applications?&lt;br /&gt;
&lt;br /&gt;
This presentation will detail the security features of Windows Phone 7 with an emphasis on how developers can produce Windows Phone 7 apps that are free from common mobile application security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This talk will start by looking at why we should care about mobile security, what the implications are for developers and security professionals and how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
I will then focus on the security model and features of Windows Phone 7 and how these features compare to those found in the iOS and Android operating systems.&lt;br /&gt;
&lt;br /&gt;
The final part of this talk will focus on the types of vulnerabilities seen in mobile applications over the past few years and how developers can ensure their Windows Phone 7 apps are free from these vulnerabilities. This will include reviews of insecure and secure code samples from real world applications. &lt;br /&gt;
&lt;br /&gt;
This talk will arm developers and security professionals with an understanding of the Windows Phone 7 security features and the guidance they need to produce secure Windows Phone 7 apps.&lt;br /&gt;
&lt;br /&gt;
This talk will include demonstrations of Windows Phone 7 security tools that I'm developing such as the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
&lt;br /&gt;
The Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft and the SC Magazine Rising Star 2012. David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
December 2nd, Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203339</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=203339"/>
				<updated>2015-11-13T08:54:31Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at [http://owaspbrum.eventbrite.co.uk eventbrite]&lt;br /&gt;
&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. &lt;br /&gt;
&lt;br /&gt;
'''Windows Phone 7 platform and application security overview'''&lt;br /&gt;
&lt;br /&gt;
Windows Phone 7 is the latest mobile operating system from Microsoft and is the youngest of all the major smartphone operating systems. Since it was released in late 2010 it has gained a small share of the smartphone market but this is likely to increase significantly with Nokia now using it as the OS for their flagship models.&lt;br /&gt;
&lt;br /&gt;
The young age of the OS and the small market share size means there has been very little security research carried out against this platform so far. This means that developers and security professionals are working with this platform without a detailed understanding of the security features and potential shortcomings.&lt;br /&gt;
&lt;br /&gt;
Security should be part of the DNA of any application which stores or transmits sensitive data but how many of the developers with published applications understand common mobile application security vulnerabilities and more importantly how many know how to prevent them in their own applications?&lt;br /&gt;
&lt;br /&gt;
This presentation will detail the security features of Windows Phone 7 with an emphasis on how developers can produce Windows Phone 7 apps that are free from common mobile application security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This talk will start by looking at why we should care about mobile security, what the implications are for developers and security professionals and how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
I will then focus on the security model and features of Windows Phone 7 and how these features compare to those found in the iOS and Android operating systems.&lt;br /&gt;
&lt;br /&gt;
The final part of this talk will focus on the types of vulnerabilities seen in mobile applications over the past few years and how developers can ensure their Windows Phone 7 apps are free from these vulnerabilities. This will include reviews of insecure and secure code samples from real world applications. &lt;br /&gt;
&lt;br /&gt;
This talk will arm developers and security professionals with an understanding of the Windows Phone 7 security features and the guidance they need to produce secure Windows Phone 7 apps.&lt;br /&gt;
&lt;br /&gt;
This talk will include demonstrations of Windows Phone 7 security tools that I'm developing such as the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
&lt;br /&gt;
The Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft and the SC Magazine Rising Star 2012. David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132349</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132349"/>
				<updated>2012-06-29T07:40:54Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at [http://owaspbrum.eventbrite.co.uk eventbrite]&lt;br /&gt;
&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. &lt;br /&gt;
&lt;br /&gt;
'''Windows Phone 7 platform and application security overview'''&lt;br /&gt;
&lt;br /&gt;
Windows Phone 7 is the latest mobile operating system from Microsoft and is the youngest of all the major smartphone operating systems. Since it was released in late 2010 it has gained a small share of the smartphone market but this is likely to increase significantly with Nokia now using it as the OS for their flagship models.&lt;br /&gt;
&lt;br /&gt;
The young age of the OS and the small market share size means there has been very little security research carried out against this platform so far. This means that developers and security professionals are working with this platform without a detailed understanding of the security features and potential shortcomings.&lt;br /&gt;
&lt;br /&gt;
Security should be part of the DNA of any application which stores or transmits sensitive data but how many of the developers with published applications understand common mobile application security vulnerabilities and more importantly how many know how to prevent them in their own applications?&lt;br /&gt;
&lt;br /&gt;
This presentation will detail the security features of Windows Phone 7 with an emphasis on how developers can produce Windows Phone 7 apps that are free from common mobile application security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This talk will start by looking at why we should care about mobile security, what the implications are for developers and security professionals and how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
I will then focus on the security model and features of Windows Phone 7 and how these features compare to those found in the iOS and Android operating systems.&lt;br /&gt;
&lt;br /&gt;
The final part of this talk will focus on the types of vulnerabilities seen in mobile applications over the past few years and how developers can ensure their Windows Phone 7 apps are free from these vulnerabilities. This will include reviews of insecure and secure code samples from real world applications. &lt;br /&gt;
&lt;br /&gt;
This talk will arm developers and security professionals with an understanding of the Windows Phone 7 security features and the guidance they need to produce secure Windows Phone 7 apps.&lt;br /&gt;
&lt;br /&gt;
This talk will include demonstrations of Windows Phone 7 security tools that I'm developing such as the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
&lt;br /&gt;
The Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft and the SC Magazine Rising Star 2012. David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132335</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132335"/>
				<updated>2012-06-28T13:29:39Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added tickets and google event links | Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
&lt;br /&gt;
== Tickets ==&lt;br /&gt;
&lt;br /&gt;
'''Tickets''' at [http://owaspbrum.eventbrite.co.uk eventbrite]&lt;br /&gt;
&lt;br /&gt;
'''Google Event''' at [https://plus.google.com/u/0/events/c1a9q30es8pimnh3kobrgq6tir8/100366582857962815227 Google+]&lt;br /&gt;
&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. &lt;br /&gt;
&lt;br /&gt;
'''Windows Phone 7 platform and application security overview'''&lt;br /&gt;
&lt;br /&gt;
Windows Phone 7 is the latest mobile operating system from Microsoft and is the youngest of all the major smartphone operating systems. Since it was released in late 2010 it has gained a small share of the smartphone market but this is likely to increase significantly with Nokia now using it as the OS for their flagship models.&lt;br /&gt;
&lt;br /&gt;
The young age of the OS and the small market share size means there has been very little security research carried out against this platform so far. This means that developers and security professionals are working with this platform without a detailed understanding of the security features and potential shortcomings.&lt;br /&gt;
&lt;br /&gt;
Security should be part of the DNA of any application which stores or transmits sensitive data but how many of the developers with published applications understand common mobile application security vulnerabilities and more importantly how many know how to prevent them in their own applications?&lt;br /&gt;
&lt;br /&gt;
This presentation will detail the security features of Windows Phone 7 with an emphasis on how developers can produce Windows Phone 7 apps that are free from common mobile application security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This talk will start by looking at why we should care about mobile security, what the implications are for developers and security professionals and how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
I will then focus on the security model and features of Windows Phone 7 and how these features compare to those found in the iOS and Android operating systems.&lt;br /&gt;
&lt;br /&gt;
The final part of this talk will focus on the types of vulnerabilities seen in mobile applications over the past few years and how developers can ensure their Windows Phone 7 apps are free from these vulnerabilities. This will include reviews of insecure and secure code samples from real world applications. &lt;br /&gt;
&lt;br /&gt;
This talk will arm developers and security professionals with an understanding of the Windows Phone 7 security features and the guidance they need to produce secure Windows Phone 7 apps.&lt;br /&gt;
&lt;br /&gt;
This talk will include demonstrations of Windows Phone 7 security tools that I'm developing such as the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
&lt;br /&gt;
The Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft and the SC Magazine Rising Star 2012. David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132312</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=132312"/>
				<updated>2012-06-28T08:42:42Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added David's bio and abstract | Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. &lt;br /&gt;
&lt;br /&gt;
'''Windows Phone 7 platform and application security overview'''&lt;br /&gt;
&lt;br /&gt;
Windows Phone 7 is the latest mobile operating system from Microsoft and is the youngest of all the major smartphone operating systems. Since it was released in late 2010 it has gained a small share of the smartphone market but this is likely to increase significantly with Nokia now using it as the OS for their flagship models.&lt;br /&gt;
&lt;br /&gt;
The young age of the OS and the small market share size means there has been very little security research carried out against this platform so far. This means that developers and security professionals are working with this platform without a detailed understanding of the security features and potential shortcomings.&lt;br /&gt;
&lt;br /&gt;
Security should be part of the DNA of any application which stores or transmits sensitive data but how many of the developers with published applications understand common mobile application security vulnerabilities and more importantly how many know how to prevent them in their own applications?&lt;br /&gt;
&lt;br /&gt;
This presentation will detail the security features of Windows Phone 7 with an emphasis on how developers can produce Windows Phone 7 apps that are free from common mobile application security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
This talk will start by looking at why we should care about mobile security, what the implications are for developers and security professionals and how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
I will then focus on the security model and features of Windows Phone 7 and how these features compare to those found in the iOS and Android operating systems.&lt;br /&gt;
&lt;br /&gt;
The final part of this talk will focus on the types of vulnerabilities seen in mobile applications over the past few years and how developers can ensure their Windows Phone 7 apps are free from these vulnerabilities. This will include reviews of insecure and secure code samples from real world applications. &lt;br /&gt;
&lt;br /&gt;
This talk will arm developers and security professionals with an understanding of the Windows Phone 7 security features and the guidance they need to produce secure Windows Phone 7 apps.&lt;br /&gt;
&lt;br /&gt;
This talk will include demonstrations of Windows Phone 7 security tools that I'm developing such as the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja.&lt;br /&gt;
&lt;br /&gt;
The Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft and the SC Magazine Rising Star 2012. David strives to practice what he preaches and has backed up his work experience by developing two open source security code review tools called Agnitio and the Windows Phone App Analyser.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131943</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131943"/>
				<updated>2012-06-26T11:39:38Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added jamie Riden talk info and bio, re-jigged the order of tabs| Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner '''David Rook''' will be back in Birmingham to give this months first talk. Details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jamie Riden''' will be giving a short talk on web application honeypots, from history to current work and how they can be of use in researching current techniques of attackers, and in protecting web servers from exploitation even in the face of programming failures.&lt;br /&gt;
&lt;br /&gt;
The talk will include a live demo of a honeypot&lt;br /&gt;
&lt;br /&gt;
'''Jamie''' is a published security researcher, specifically in the field of honeypots. He is an active member of the Honeynet Project, having helped set up the current incarnation of the Project's web server, and has supervised students for various honeypot-related projects for the Google Summer of Code.&lt;br /&gt;
&lt;br /&gt;
He has published several articles on the subject of honeypots, intrusion detection and incident response. He has contributed signatures to the community Snort signature project, http://www.emergingthreats.net/ and has written portions of code for the open source IDS, Suricata&lt;br /&gt;
&lt;br /&gt;
== Participate ==&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131927</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131927"/>
				<updated>2012-06-26T07:44:30Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
Faraday Wharf, Holt Street, &lt;br /&gt;
Birmingham, B7 4BB, UK&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner David Rook will be back in Birmingham to give this months first talk. Details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
Ken Munro from Pen Test Partners will be closing out the meeting with a talk on Honeypots. More details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131926</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131926"/>
				<updated>2012-06-26T07:43:15Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added next meeting details| Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
== Date ==&lt;br /&gt;
30th August at 18:30&lt;br /&gt;
== Location ==&lt;br /&gt;
Birmingham Science Park&lt;br /&gt;
== Talks ==&lt;br /&gt;
SC magazine rising star award winner David Rook will be back in Birmingham to give this months first talk. Details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
Ken Munro from Pen Test Partners will be closing out the meeting with a talk on Honeypots. More details will be posted soon.&lt;br /&gt;
&lt;br /&gt;
If you'd like to present at one of our meetings then don't forget to fill in the [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 speaker form]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2011_15_12_Birmingham&amp;diff=131925</id>
		<title>2011 15 12 Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2011_15_12_Birmingham&amp;diff=131925"/>
				<updated>2012-06-26T07:27:51Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Created page with &amp;quot;Location: KPMG Offices Birmingham  One Snowhill  Snow Hill Queensway  Birmingham  West Midlands  B4 6GH  Massive thanks to KPMG who again are supporting OWASP and giving somet...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Location: KPMG Offices Birmingham&lt;br /&gt;
&lt;br /&gt;
One Snowhill&lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway&lt;br /&gt;
&lt;br /&gt;
Birmingham&lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
&lt;br /&gt;
B4 6GH&lt;br /&gt;
&lt;br /&gt;
Massive thanks to KPMG who again are supporting OWASP and giving something back to the community.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Schedule: 18:00 for 18:20 start&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18:20-18:30&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
18:30 - 19:10&lt;br /&gt;
&lt;br /&gt;
Talk 1 Agnitio: the security code review Swiss army knife&lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
Speaker David Rook Application Security Lead - Realex Payments Ltd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
19:30 - 20:10&lt;br /&gt;
&lt;br /&gt;
Talk 2: Mobile Security - The Tune is Different, The Dance is the Same&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
Speaker Paco Hope, Principal Consultant, Cigital&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
20:20 -21-00&lt;br /&gt;
&lt;br /&gt;
Talk 3: Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
Speaker David Rook Application Security Lead - Realex Payments Ltd&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker Bio's&lt;br /&gt;
&lt;br /&gt;
David Rook is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Paco Hope is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_23_03_Birmingham&amp;diff=131924</id>
		<title>2012 23 03 Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_23_03_Birmingham&amp;diff=131924"/>
				<updated>2012-06-26T07:26:56Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Created page with &amp;quot;Date: Friday 23rd March :::  Location: Service Birmingham Offices  B1 Building  50 Summerhill Road  B1 3RB Birmingham  Talks  Tom MacKenzie will be reprising the talk he gave ...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Date: Friday 23rd March :::&lt;br /&gt;
&lt;br /&gt;
Location: Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building&lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
Talks&lt;br /&gt;
&lt;br /&gt;
Tom MacKenzie will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
&lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
&lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
&lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
&lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
&lt;br /&gt;
Ian Williams will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security. There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
Uzi Yair, the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Speaker Bio's&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
Security Analysis and Testing&lt;br /&gt;
Incident Response and Investigation&lt;br /&gt;
Research &amp;amp; Development&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities. Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner.&lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution. Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry. Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=2012_06_06_Birmingham&amp;diff=131923</id>
		<title>2012 06 06 Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=2012_06_06_Birmingham&amp;diff=131923"/>
				<updated>2012-06-26T07:25:56Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Created page with &amp;quot;Date: Wednesday 6th June :::  Location: ICC Broad Street Birmingham B1 2AA  Talks  Jason Alexander In this presentaion Jason will show how the free and open resources of OWASP...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Date: Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
Location: ICC Broad Street Birmingham B1 2AA&lt;br /&gt;
&lt;br /&gt;
Talks&lt;br /&gt;
&lt;br /&gt;
Jason Alexander In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
Peter Bassill In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching.&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131922</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131922"/>
				<updated>2012-06-26T07:25:10Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added tabbed pane at the bottom to tide they page up, Thanks Manchester| Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Planned Chapter Meetings =&lt;br /&gt;
&lt;br /&gt;
August 30th 2012 Venue:Birmingham Science Park&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
= Next Meeting =&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
&lt;br /&gt;
[[2012_06_06_Birmingham|6th June]]&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
[[2011_15_12_Birmingham|15th December]]&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131913</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=131913"/>
				<updated>2012-06-26T07:16:06Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added March page | Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
June 6th 2012 Venue:ICC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Tickets'''&lt;br /&gt;
&lt;br /&gt;
Sign up for your free tickets at [http://owaspbrum.eventbrite.co.uk/ Eventbrite]&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
[[2012_23_03_Birmingham|23rd March]]&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129879</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129879"/>
				<updated>2012-05-15T07:45:38Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added speaker talk form: Ian.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
If you would like to submit a talk then please [https://docs.google.com/a/fishermansenemy.com/spreadsheet/viewform?formkey=dEtraldFSkh4YWxPWkxwdVFfcGNGRHc6MQ#gid=0 fill in this form]&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
June 6th 2012 Venue:ICC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Tickets'''&lt;br /&gt;
&lt;br /&gt;
Sign up for your free tickets at [http://owaspbrum.eventbrite.co.uk/ Eventbrite]&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129520</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129520"/>
				<updated>2012-05-10T10:31:57Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added tickets link for June. IW&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
June 6th 2012 Venue:ICC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Tickets'''&lt;br /&gt;
&lt;br /&gt;
Sign up for your free tickets at [http://owaspbrum.eventbrite.co.uk/ Eventbrite]&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129469</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129469"/>
				<updated>2012-05-09T07:56:26Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
June 6th 2012 Venue:ICC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Wednesday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129468</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=129468"/>
				<updated>2012-05-09T07:40:48Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Moved March to past events and added June details: Ian.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
June 6th 2012 Venue:ICC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Thursday 6th June :::&lt;br /&gt;
&lt;br /&gt;
'''Location:''' &lt;br /&gt;
ICC&lt;br /&gt;
Broad Street&lt;br /&gt;
Birmingham&lt;br /&gt;
B1 2AA&lt;br /&gt;
&lt;br /&gt;
'''Confirmed Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' &lt;br /&gt;
In this presentaion Jason will show how the free and open resources of OWASP (Open Web Application Security Project) can be utilised to initially measure the current status and maturity of security within your software development life cycle and then drive improvements at every stage. From setting security requirements and implementing standards to developer training, software testing and all importantly measuring results.&lt;br /&gt;
&lt;br /&gt;
'''Peter Bassill'''&lt;br /&gt;
In this presentation Peter will detail the Apache mod_security module. Mod_security is a powerful addition to the Apache web server that will allow you to add an extra layer to your web applications defence in depth strategy as well as allowing some very handy tricks including virtual patching. &lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  &lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web application security from a learners perspective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Uzi Yair''', the cofounder and CEO of GTB Technologies, will be giving a talk on DLP. The talk will cover the mitigation of data loss prevention together with the web application security – threats, problems, needs and trends&lt;br /&gt;
Why is Data Loss Prevention important for web application security experts ? According to a Gartner CISO survey, Data Loss Prevention (DLP) is the biggest priority for 2012. Data Loss Prevention (DLP) is typically defined as any solution or process that identifies confidential data, tracks that data as it moves through and out of enterprise and prevents unauthorized disclosure of data by creating and enforcing disclosure policies. Since confidential data can reside on a variety of computing devices (physical servers, virtual servers, databases, file servers, PCs, point-of-sale devices, flash drives and mobile devices) and move through a variety of network access points (wireline, wireless, VPNs, etc.) there are a variety of solutions that are tackling the problem of data loss, data recovery and data leaks. As the number of Internet-connected devices skyrockets into the billions, Data Loss Prevention is an increasingly important part of any organization’s ability to manage and protect critical and confidential information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilities in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifications GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a new commer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
Uzi Yair is the cofounder and CEO of GTB Technologies, is a leader and expert in the data leak prevention marketplace. Uzi leads the development of GTB's game changing technology; a technology which has solved the known DLP market limitation of false positive rates.&lt;br /&gt;
&lt;br /&gt;
'''December 2011'''&lt;br /&gt;
&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_9&amp;diff=126457</id>
		<title>OWASP Connections Committee - Application 9</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_9&amp;diff=126457"/>
				<updated>2012-03-16T23:05:09Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: my recommendation for Luiz: Thomas Mackenzie&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Luiz Eduardo Dos Santos&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | LATAM Regional Event Coordinator, Member&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; width: 25%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 85%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; colspan=&amp;quot;1&amp;quot; | OWASP Connection Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(64, 88, 160) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: white none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(123, 138, 189) none repeat scroll 0% 0%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Lucas C. Ferreira&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Portuguese Project Leader, Conferences Committee Member&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Luiz Eduardo is one of the best known security professionals in Brazil, has helped with the Program committee of AppSec Brasil 2011 and is very well connected to industry and academia folks around the globe. &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Eduardo V. C. Neves&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; |  Former member of the Global Education Committee&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Luiz Eduardo is a professional working on the Information Security industry for many years and was able to create and maintain one of the most important Security Conferences in Brazil for six years, maintain a Security Podcast, create a second conference and keep his sanity. He can be a great contribution to an OWASP Committee using his energy, creativity and connections to increase the presence and exposure of the Project's mission.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Maximiliano Soler&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | OWASP Argentina Chapter&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Luiz Eduardo is a well known professional. He has great talent and deep technical knowledge. His experience in the region, through conferences where he has participated like speaker and organized give an excellent perspective and skills. I would highly recommend Luiz for this position.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Thomas Mackenzie&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | Birmingham UK Co-Chapter Leader&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | I work in the same company as Luiz. He is a knowledgeable and respected leader for the region that he resides over. and His talent and passion for security speaks for itself when you see the presence He has had at numerous conferences including speaking and organizing. I have no issue in recommending Luiz for this role and believe the committee would be a better place with him involved.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 3%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | NAME&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 20%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | TITLE&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: rgb(204, 204, 204) none repeat scroll 0% 0%; width: 57%; -moz-background-clip: border; -moz-background-origin: padding; -moz-background-inline-policy: continuous;&amp;quot; | WHY&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125748</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125748"/>
				<updated>2012-03-08T10:16:12Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added Hedgehog Security Logo - Ian&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
[[File:Hedgehogsec.jpg|200px|thumb|left]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Service Birmingham&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  Please RSVP via '''[http://owaspbirmingham.eventbrite.co.uk eventbrite]''' You must register prior to the event.&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web applcaiton security from a learners pespective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilties in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifcations GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a newcommer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Hedgehogsec.jpg&amp;diff=125746</id>
		<title>File:Hedgehogsec.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Hedgehogsec.jpg&amp;diff=125746"/>
				<updated>2012-03-08T10:12:12Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: HedgeHog Security Logo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;HedgeHog Security Logo&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125645</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125645"/>
				<updated>2012-03-06T15:02:37Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added talk details and bio's&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Service Birmingham&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  Please RSVP via '''[http://owaspbirmingham.eventbrite.co.uk eventbrite]''' You must register prior to the event.&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
'''Talks'''&lt;br /&gt;
&lt;br /&gt;
'''Tom MacKenzie''' will be reprising the talk he gave at Black Hat Abu Dhabi.&lt;br /&gt;
&lt;br /&gt;
Meticulous attackers can subvert audit controls to the point where a compromise is almost undetectable. We look at the tools and techniques which can be used by attackers to minimise evidence left behind and propose a novel strategy for managing this issue.&lt;br /&gt;
 &lt;br /&gt;
Fully identifying the method and impact of a data compromise is heavily reliant on the forensic information available to investigators. Commonly this is dependent on having logs for the compromised period. However, in the cases where an attacker has taken steps to reduce their footprint on the system, investigations can be more challenging.&lt;br /&gt;
 &lt;br /&gt;
We explore the various evidential sources which are commonly used to identify the extent and method of a web application compromise. We then discuss an attack which, due to its nature, is more complicated to identify and understand. The presentation will draw together the techniques used in investigating a data compromise and create an attack which is designed to completely compromise the web server while leaving the least amount of evidence on the system.&lt;br /&gt;
 &lt;br /&gt;
Incident readiness specialists can often recommend that verbose logging is put in place. Logging such as full http request and response logging fits the bill for the investigator but by their nature these logs have serious drawbacks for the day to day management of the server; large storage requirements, incidental storage of sensitive data and performance issues are common problems.&lt;br /&gt;
 &lt;br /&gt;
We suggest a new approach, restricting access or logging anomalies at the framework level. By blending the information gained at the framework level with automated application profiling techniques we can create heavily targeted logs bespoke to the specific application. This can be implemented for all applications regardless of whether source code is available. This method gives us the best chance of keeping logging to an absolute minimum whilst ensuring that techniques used to minimise forensic evidence left by an attack are unsuccessful.&lt;br /&gt;
 &lt;br /&gt;
'''Ian Williams''' will be giving his first ever public talk (be gentle!) on how to get into web applcaiton security from a learners pespective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
There are plenty of books out there on web app security, SQLi and XSS. Reading about them is one thing, but if you are really going to understand how they work you've got to get your hands dirty. We will be looking at one environment in which you can practice what you've read about without fear of getting sue'd, but still getting some exposure to some of the techniques that are used to try any mitigate the attacks you are doing.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
Thomas Mackenzie is an Application Security Consultant for SpiderLabs in Europe, the Middle East and Africa. SpiderLabs is the global advanced security services team within Trustwave responsible for:&lt;br /&gt;
&lt;br /&gt;
* Security Analysis and Testing&lt;br /&gt;
* Incident Response and Investigation&lt;br /&gt;
* Research &amp;amp; Development&lt;br /&gt;
&lt;br /&gt;
Thomas has been asked to present technical talks at a number of international events including, DeepSec, Bsides Chicago and BlackHat Abu Dhabi. Thomas also speaks at a number of domestic venues including; OWASP events across the UK, PHP London, Marketing Event around WordPress, DC4420 and guest lecturing on application security and vulnerability management at a number of UK universities.&lt;br /&gt;
Thomas is the founder of upSploit Advisory Management, an automated disclosure system that helps security researchers and vendors communicate vulnerability information quickly, easily and in an ethical manner. &lt;br /&gt;
&lt;br /&gt;
Previously to Trustwave Thomas worked for security boutique in the North of England, where he worked as a security engineer in the web application security testing team. Before completing his move to SpiderLabs, he contracted for a number of companies providing consulting services in the area of web application security.&lt;br /&gt;
&lt;br /&gt;
Thomas has founded a number of vulnerabilities in well known software i.e. Wordpress and a highly downloaded iPhone App.&lt;br /&gt;
&lt;br /&gt;
Ian Williams is an Information Security Analyst for RWE IT UK, the IT provider for RWEnpower and one of the largest utilties in the UK. Ian is rather new to the security field having moved into it from a career in Wintel server support and software packaging and distribution.&lt;br /&gt;
Always being one to have a tinker with things security had become a natural fit with Ian obtaining GIAC certifcations GCIH, GAWN and GPEN in the 5 years since he started in the industry.&lt;br /&gt;
Ian is a passionate supporter of the UK information security community and is working to pay back all of the support he has gained in the last 5 years by organising local security meetings such as OWASP and 2600 and speaking as a newcommer to the industry, in the hope it will encourage more of the IT tinkerers to come over to the dark side!&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125644</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125644"/>
				<updated>2012-03-06T14:57:59Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Service Birmingham&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  Please RSVP via '''[http://owaspbirmingham.eventbrite.co.uk eventbrite]''' You must register prior to the event.&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
Tom MacKenzie will be reprising the talk he gave at Black Hat Abu Dhabi. More details to follow.&lt;br /&gt;
 &lt;br /&gt;
Ian Williams will be giving his first ever public talk (be gentle!) on how to get into web applcaiton security from a learners pespective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125643</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125643"/>
				<updated>2012-03-06T14:50:54Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added hedgehog security sponsorship text&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Sponsors ==&lt;br /&gt;
&lt;br /&gt;
Many thanks to our first silver Sponsor, [https://www.hedgehogsecurity.co.uk/ Hedgehog Security]&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Service Birmingham&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  Please RSVP via '''[http://owaspbirmingham.eventbrite.co.uk eventbrite]''' You must register prior to the event.&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
Tom MacKenzie will be reprising the talk he gave at Black Hat Abu Dhabi. More details to follow.&lt;br /&gt;
 &lt;br /&gt;
Ian Williams will be giving his first ever public talk (be gentle!) on how to get into web applcaiton security from a learners pespective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125564</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125564"/>
				<updated>2012-03-05T09:54:25Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Added details of March 23rd meeting. Ian.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Service Birmingham&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Friday 23rd March :::  Please RSVP via '''[http://owaspbirmingham.eventbrite.co.uk eventbrite]''' You must register prior to the event.&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Service Birmingham Offices&lt;br /&gt;
&lt;br /&gt;
B1 Building &lt;br /&gt;
&lt;br /&gt;
50 Summerhill Road&lt;br /&gt;
&lt;br /&gt;
B1 3RB Birmingham&lt;br /&gt;
&lt;br /&gt;
Tom MacKenzie will be reprising the talk he gave at Black Hat Abu Dhabi. More details to follow.&lt;br /&gt;
 &lt;br /&gt;
Ian Williams will be giving his first ever public talk (be gentle!) on how to get into web applcaiton security from a learners pespective. Ian will be looking at the Damn Vulnerable Web Application and how it can be used to learn web application security.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125563</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=125563"/>
				<updated>2012-03-05T09:18:32Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Moved Next Meeting to Past Events. Added date and location for March meeting. Added UK to paypal donate button to avoid confusion.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 23rd 2012 Venue: Capita (TBC)&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
'''Date:''' Thursday 15th December:::  Please RSVP via '''[http://owaspbrum.eventbrite.co.uk eventbrite]''' You must register prior to the event. We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Leeds_UK&amp;diff=122162</id>
		<title>Leeds UK</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Leeds_UK&amp;diff=122162"/>
				<updated>2012-01-03T13:33:33Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Leeds UK|extra=&lt;br /&gt;
&lt;br /&gt;
This is a new chapter and we are looking for enthusiatic new members to make this one of the best OWASP chapters. We are hoping to accumalate a good proportion of subject matter experts who will in turn be able to provide guidance and presentations for the benefit of all chapter members. So please join the mailing list and contribute. &lt;br /&gt;
&lt;br /&gt;
Details of your chapter Board members can be found here [[Leeds_UK_chapter_leaders]] &lt;br /&gt;
&lt;br /&gt;
The chapter email address is [mailto:owaspleeds@gmail.com owaspleeds@gmail.com]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Leeds_UK|emailarchives=http://lists.owasp.org/pipermail/owasp-Leeds_UK}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Leeds_UK&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Planned Meetings ==&lt;br /&gt;
February  2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Tuesday 25th October Leeds:::  Please RSVP via '''[http://www.eventbrite.com/event/2353391056  eventbrite]'''&lt;br /&gt;
&lt;br /&gt;
'''PLEASE NOTE. MORE DETAILS ON TALKS WILL FOLLOW'''&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Leeds&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Leeds board member&lt;br /&gt;
&lt;br /&gt;
AppSensor - Detect and Respond to Attacks from Within the Application&lt;br /&gt;
&lt;br /&gt;
''Colin Watson, project contributor, Codes of Conduct project leader and Industry Committee member''&lt;br /&gt;
&lt;br /&gt;
Zed Attack Proxy ZAP - An intercepting proxy aimed at people new to appsec as well as experienced pentesters&lt;br /&gt;
&lt;br /&gt;
''Simon Bennetts,  ZAP project lead and OWASP Manchester chapter leader''&lt;br /&gt;
&lt;br /&gt;
3rd talk TBC&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
'''2011 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[June_2011]]&lt;br /&gt;
&lt;br /&gt;
'''2010 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[8th_December_Leeds]]&lt;br /&gt;
&lt;br /&gt;
[[15th_September_Leeds]]&lt;br /&gt;
&lt;br /&gt;
[[16th_june_Leeds]]&lt;br /&gt;
&lt;br /&gt;
[[17th March - Leeds]]&lt;br /&gt;
&lt;br /&gt;
'''2009 Dates'''&lt;br /&gt;
&lt;br /&gt;
[[14th October 2009 - Leeds]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;br /&gt;
[[Category:Europe]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121260</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121260"/>
				<updated>2011-12-09T11:52:03Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Thursday 15th December:::  Please RSVP via '''[http://owaspbrum.eventbrite.co.uk eventbrite]''' You must register prior to the event. We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
Massive thanks to [http://www.kpmg.com/UK/en/WhatWeDo/Advisory/risk-consulting/services/tech-risk/Pages/InformationProtectionBusinessResilience.aspx KPMG] who again are supporting OWASP and giving something back to the community. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121259</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121259"/>
				<updated>2011-12-09T11:46:38Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are  here [[Birmingham_Chapter_Leaders]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Thursday 15th December:::  Please RSVP via '''[http://owaspbrum.eventbrite.co.uk eventbrite]''' You must register prior to the event. We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121258</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121258"/>
				<updated>2011-12-09T11:42:00Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are [[here]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP is a charitable organisation. Our chapter meetings are free to attend but there are always costs associated with running them. Any amount of donation is appreciated and will be used entirely to enhance the chapter meetings: &amp;lt;paypal&amp;gt;Birmingham&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter  News ==&lt;br /&gt;
&lt;br /&gt;
'''Planned Chapter Meetings'''&lt;br /&gt;
&lt;br /&gt;
March 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
June2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
September 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
December 2012 Venue:TBC&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
'''Date:''' Thursday 15th December:::  Please RSVP via '''[http://owaspbrum.eventbrite.co.uk eventbrite]''' You must register prior to the event. We have to supply KPMG a list of attendees 24 hours before the meeting. If all tickets are gone please request to go on  the standby list&lt;br /&gt;
&lt;br /&gt;
'''Location:''' KPMG Offices Birmingham &lt;br /&gt;
&lt;br /&gt;
One Snowhill &lt;br /&gt;
&lt;br /&gt;
Snow Hill Queensway &lt;br /&gt;
&lt;br /&gt;
Birmingham &lt;br /&gt;
&lt;br /&gt;
West Midlands&lt;br /&gt;
 &lt;br /&gt;
B4  6GH &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Schedule: 18:00 for 18:20 start'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:20-18:30'''&lt;br /&gt;
&lt;br /&gt;
OWASP Chapter introduction. OWASP values and membership. Chapter information.&lt;br /&gt;
&lt;br /&gt;
OWASP Birmingham Chapter Leader&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''18:30 - 19:10''' &lt;br /&gt;
&lt;br /&gt;
'''Talk 1''' ''Agnitio: the security code review Swiss army knife'' &lt;br /&gt;
&lt;br /&gt;
Teaching developers to write secure code, helping security professionals find security flaws in source code, producing application security metrics and reports with integrity checks and audit trails. If you want to implement an SDLC that produces secure software with the audit trails and reports frequently demanded by auditors and management you need to acknowledge that these are key constituents and implement them in a form that is both easy to understand and use.&lt;br /&gt;
&lt;br /&gt;
This is far easier to talk about than it is to implement in the real world where well structured SDLC’s are rare and application security programmes are usually under funded. Working with developers, security professionals and management to cultivate an environment where secure code is written and flaws found consistently requires both time and money. The same can be said for producing informative reports and metrics when all of your security code review data resides in notepad, Word and Excel files. With these problems in mind I developed Agnitio to be my security code review Swiss army knife and released it as a free tool in late 2010.&lt;br /&gt;
&lt;br /&gt;
In this demonstration filled talk I will show how Agnitio can be used to addresses repeatability, integrity and audit trail concerns by requiring the creation of application profiles, the use of a security code review checklist consisting of over 80 application security questions and mandatory integrity checks for reviews and reports created using the tool. I will demonstrate how the inbuilt secure coding and security code review guidance modules allow developers and security professionals to access the information they need precisely when they need it. I will also show how Agnitio automatically creates metrics and reports bringing much needed visibility to the security code review process with no extra effort required from the reviewer, developers or management.&lt;br /&gt;
&lt;br /&gt;
Agnitio v2.1 will be demonstrated during this talk which will show how Agnitio’s already powerful feature set has been expanded to guidance and questions linked to the OWASP top 10 mobile risks as well as the ability to decompile and analyse Android applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''''' David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''19:30 - 20:10'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 2:'''  ''Mobile Security - The Tune is Different, The Dance is the Same''&lt;br /&gt;
&lt;br /&gt;
Paco Hope will discuss what is fundamentally new about mobile applications, and what is fundamentally not new with respect to securing them. Looking at how the platforms work, their respective app stores, and the role of carriers and their security, we will understand four golden rules to ensuring secure use and development of mobile apps. Whether we are the app developer, security professional, or just someone trying to use their mobile securely, these four rules are important to know.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' Paco Hope, Principal Consultant, Cigital &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''20:20 -21-00'''&lt;br /&gt;
&lt;br /&gt;
'''Talk 3:'''   ''Mobile Application Security''&lt;br /&gt;
&lt;br /&gt;
This talk will start by taking a look at the mobile applosion that we have all witnessed since the Apple App Store was launched on the 11th July 2008. Mobile users have downloaded over 25 billion mobile apps since that day which is roughly 14,000 apps for every minute since Apple launched the App Store. Those kinds of numbers make it clear that mobile apps are big business and that we need to quickly understand how to secure these applications.&lt;br /&gt;
&lt;br /&gt;
I will show how mobile manufacturers and network operators are now a big part of your threat models and how their approach to security could undermine your application security efforts.&lt;br /&gt;
&lt;br /&gt;
The final part of the talk will focus on Android and iOS applications. I will give an overview of each platform as well guidance on how you should approach security code reviews for Android and iOS applications.&lt;br /&gt;
&lt;br /&gt;
'''Speaker''' ''David Rook Application Security Lead - Realex Payments Ltd''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio's'''&lt;br /&gt;
&lt;br /&gt;
'''David Rook''' is the Application Security Lead at Realex Payments in Dublin. He is a contributor to several OWASP projects including the code review guide and the Cryptographic Storage Cheat Sheet. He has presented at leading information security conferences including DEF CON, BlackHat USA and RSA Europe. In addition to his work with OWASP David created a security resource website and blog called Security Ninja (http://www.securityninja.co.uk).&lt;br /&gt;
&lt;br /&gt;
In 2010 the Security Ninja blog was nominated for five awards including the best technology blog at the Irish Blog Awards, the Computer Weekly IT Security blog award and was a finalist for the Irish Web Awards Best Technology Site. In 2011 David received a Developer Security MVP award from Microsoft. David has recently become one of the first mentors in the Information Security Mentors project helping young people progress their information security careers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Paco Hope''' is a Principal Consultant with Cigital, Inc. and has 12 years of experience in mobile security, embedded security, web software security and operating system security. He has led numerous engagements assessing source code and implementations of mobile phones, lottery systems, casino gaming devices, smart cards and web applications. He is the co-author of The Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. Mr. Hope also serves on the Application Security Advisory Board of (ISC)2, acting as a subject matter expert for the Certified Information Systems Security Professional (CISSP) and the Certified Secure Software Lifecycle Professional (CSSLP).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham_Chapter_Leaders&amp;diff=121257</id>
		<title>Birmingham Chapter Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham_Chapter_Leaders&amp;diff=121257"/>
				<updated>2011-12-09T10:46:53Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
'''Mike Kemp'''  -Co-Founder Xiphos Research Labs&lt;br /&gt;
&lt;br /&gt;
Mike has been involved in the IT security industry since Adam was a lad.  He has talked at many security conferences  around the globe and is well known and respected throughout the industry.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Tom Mackenzie''' - Web appliction security consultant at Trustwave&lt;br /&gt;
&lt;br /&gt;
Tom loves Yorkie bars.... but apart from that and despite his young years he has a wealth of web application security knowledge. He has also supported the Leeds and Manchester chapters by often speaking and presenting at them&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Ian Williams''' -IT Security Analyst at RWE IT UK.&lt;br /&gt;
&lt;br /&gt;
Ian has a wealth of operational security experience including logging and monitoring technologies.He also holds SANS certifications GCIH, GAWN and GPEN&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Majid Ali'''  -Technical Security Analyst at NEC Group&lt;br /&gt;
&lt;br /&gt;
Majid has great experience in PCI-DSS compliance and is a PCI-ISA. He also has a lot of experience with Juniper networks and is starting to focus on web application security&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Jason Alexander''' - Security Architect KPMG&lt;br /&gt;
&lt;br /&gt;
Jason has over 10 years of information security experience. He has an avid interest in web application security and especially web services security. Jason is also heavlity involved in both the Manchester and Leeds chapters too. &lt;br /&gt;
&lt;br /&gt;
'''Contact:''' [mailto:jason.alexander@owasp.org jason.alexander@owasp.org] [http://twitter.com/#0wasp Twitter]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham_Chapter_Leaders&amp;diff=121248</id>
		<title>Birmingham Chapter Leaders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham_Chapter_Leaders&amp;diff=121248"/>
				<updated>2011-12-09T09:44:43Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: Created page with &amp;quot;'''Jason Alexander''' - Security Architect KPMG Jason has over 10 years of information security experience. He has an avid interest in web application security and especially web...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Jason Alexander''' - Security Architect KPMG&lt;br /&gt;
Jason has over 10 years of information security experience. He has an avid interest in web application security and especially web services security. &lt;br /&gt;
'''Contact:''' mailto:jason.alexander@owasp.org [http://twitter.com/#0wasp]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121247</id>
		<title>Birmingham</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Birmingham&amp;diff=121247"/>
				<updated>2011-12-09T09:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;Owasp birmingham: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Birmingham, UK|extra=Details of your our Chapter Leaders are [[here]] |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-birmingham|emailarchives=http://lists.owasp.org/pipermail/owasp-birmingham}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Owasp birmingham</name></author>	</entry>

	</feed>