<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ron+Perris</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ron+Perris"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ron_Perris"/>
		<updated>2026-05-05T19:20:40Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=JSON_Web_Token_(JWT)_Cheat_Sheet_for_Java&amp;diff=240111</id>
		<title>JSON Web Token (JWT) Cheat Sheet for Java</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=JSON_Web_Token_(JWT)_Cheat_Sheet_for_Java&amp;diff=240111"/>
				<updated>2018-04-20T17:55:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
= Introduction  =&lt;br /&gt;
__TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
Many applications use '''JSON Web Tokens''' (JWT) to allow the client to indicate its identity for further exchange after authentication.&lt;br /&gt;
&lt;br /&gt;
From ''https://jwt.io/introduction'':&lt;br /&gt;
&lt;br /&gt;
''JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA.''&lt;br /&gt;
&lt;br /&gt;
JSON Web Token is used to carry information related to the identity and characteristics (claims) of a client. This &amp;quot;container&amp;quot; is signed by the server in order to avoid that a client tamper it in order to change, for example, the identity or any characteristics (example: change the role from simple user to admin or change the client login).&lt;br /&gt;
&lt;br /&gt;
This token is created during authentication (is provided in case of successful authentication) and is verified by the server before any processing. It is used by an application to allow a client to present a token representing his &amp;quot;identity card&amp;quot; (container with all information about him) to server and allow the server to verify the validity and integrity of the token in a secure way, all of this in a stateless and portable approach (portable in the way that client and server technologies can be different including also the transport channel even if HTTP is the most often used).&lt;br /&gt;
&lt;br /&gt;
= Token structure =&lt;br /&gt;
&lt;br /&gt;
Token structure example taken from ''https://jwt.io/#debugger'':&lt;br /&gt;
&lt;br /&gt;
'''[ Base64(HEADER) ] . [ Base64(PAYLOAD) ] . [ Base64(SIGNATURE) ]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiYWRtaW4iOnRydWV9.TJVA95OrM7E2cBab30RMHrHDcEfxjoYZgeFONFh7HgQ&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chunk 1: Header&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{&lt;br /&gt;
 &amp;quot;alg&amp;quot;: &amp;quot;HS256&amp;quot;,&lt;br /&gt;
 &amp;quot;typ&amp;quot;: &amp;quot;JWT&amp;quot;&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chunk 2: Payload&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
{&lt;br /&gt;
 &amp;quot;sub&amp;quot;: &amp;quot;1234567890&amp;quot;,&lt;br /&gt;
 &amp;quot;name&amp;quot;: &amp;quot;John Doe&amp;quot;,&lt;br /&gt;
 &amp;quot;admin&amp;quot;: true&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Chunk 3: Signature&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HMACSHA256( base64UrlEncode(header) + &amp;quot;.&amp;quot; + base64UrlEncode(payload), KEY )&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Objective =&lt;br /&gt;
This cheatsheet provides tips to prevent common security issues when using JSON Web Tokens (JWT) with Java.&lt;br /&gt;
&lt;br /&gt;
The tips presented in this article are part of a Java project that was created to show the correct way to handle creation and validation of JSON Web Tokens. You can find the Java project [https://github.com/righettod/poc-jwt here], it uses the official [https://jwt.io/#libraries JWT library].&lt;br /&gt;
&lt;br /&gt;
In the rest of the article, the term '''token''' refer to the '''JSON Web Tokens''' (JWT).&lt;br /&gt;
&lt;br /&gt;
= Consideration about using JWT =&lt;br /&gt;
&lt;br /&gt;
Even if a JWT token is &amp;quot;easy&amp;quot; to use and allow to expose services (mostly REST style) in a stateless way, it's not the solution that fits for all applications because it comes with some caveats, like for example the question of the storage of the token (tackled in this cheatsheet) and others...&lt;br /&gt;
&lt;br /&gt;
If your application does not need to be fully stateless, you can consider using traditional session system provided by all web frameworks and follow the advice from the dedicated [[Session_Management_Cheat_Sheet|cheatsheet]]. However, for stateless applications, when well implemented, it's a good candidate.&lt;br /&gt;
&lt;br /&gt;
= Issues =&lt;br /&gt;
&lt;br /&gt;
== NONE hashing algorithm ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
This attack, described [https://auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/ here] occur when a attacker alter the token and change the hashing algorithm to indicate, through, the ''none'' keyword, that the integrity of the token has already been verified. As explained in the link above ''some libraries treated tokens signed with the none algorithm as a valid token with a verified signature'', so an attacker can alter the token claims and tkey will be trusted by the application.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
First, use a JWT library that is not exposed to this vulnerability.&lt;br /&gt;
&lt;br /&gt;
Last, during token validation, explicitly request that the expected algorithm was used.&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
// HMAC key - Block serialization and storage as String in JVM memory&lt;br /&gt;
private transient byte[] keyHMAC = ...;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
//Create a verification context for the token requesting explicitly the use of the HMAC-256 hashing algorithm&lt;br /&gt;
JWTVerifier verifier = JWT.require(Algorithm.HMAC256(keyHMAC)).build();&lt;br /&gt;
&lt;br /&gt;
//Verify the token, if the verification fail then a exception is throwed&lt;br /&gt;
DecodedJWT decodedToken = verifier.verify(token);&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Token sidejacking ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
This attack occur when a token has been intercepted/stolen by a attacker and this one use it to gain access to the system using targeted user identity.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
A way to protect is to add &amp;quot;user context&amp;quot; in the token. User context will be composed by the following information:&lt;br /&gt;
&lt;br /&gt;
* A random string that will be generated during the authentication phase and will be included into the token and also send to the client as an hardened cookie (flags: HttpOnly + Secure + SameSite + cookie prefix).&lt;br /&gt;
* A SHA256 hash of the random string will be stored in the token (instead of the raw value) in order to prevent that any XSS issue allow the attacker to read the random string value and set the expected cookie.&lt;br /&gt;
&lt;br /&gt;
IP address will not be used because there some situation in which IP address can change during the same session like for example when a user access an application through his mobile and he change of mobile operator during the exchange then he change legitimately (often) is IP address. Moreover, using IP address can potentially cause issue at [http://www.eugdpr.org/ European GDPR] compliance level.&lt;br /&gt;
&lt;br /&gt;
During token validation, if the received token do not contains the right context so, it is replayed and then it must be rejected.&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
Code to create the token after success authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
// HMAC key - Block serialization and storage as String in JVM memory&lt;br /&gt;
private transient byte[] keyHMAC = ...;&lt;br /&gt;
// Random data generator&lt;br /&gt;
private SecureRandom secureRandom = new SecureRandom();&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
//Generate a random string that will constitute the fingerprint for this user&lt;br /&gt;
byte[] randomFgp = new byte[50];&lt;br /&gt;
this.secureRandom.nextBytes(randomFgp);&lt;br /&gt;
String userFingerprint = DatatypeConverter.printHexBinary(randomFgp);&lt;br /&gt;
&lt;br /&gt;
//Add the fingerprint in a hardened cookie - Add cookie manually because SameSite attribute is not supported by javax.servlet.http.Cookie class&lt;br /&gt;
String fingerprintCookie = &amp;quot;__Secure-Fgp=&amp;quot; + userFingerprint + &amp;quot;; SameSite=Strict; HttpOnly; Secure&amp;quot;;&lt;br /&gt;
response.addHeader(&amp;quot;Set-Cookie&amp;quot;, fingerprintCookie);&lt;br /&gt;
&lt;br /&gt;
//Compute a SHA256 hash of the fingerprint in order to store the fingerprint hash (instead of the raw value) in the token&lt;br /&gt;
//to prevent an XSS to be able to read the fingerprint and set the expected cookie itself&lt;br /&gt;
MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
byte[] userFingerprintDigest = digest.digest(userFingerprint.getBytes(&amp;quot;utf-8&amp;quot;));&lt;br /&gt;
String userFingerprintHash = DatatypeConverter.printHexBinary(userFingerprintDigest);&lt;br /&gt;
&lt;br /&gt;
//Create the token with a validity of 15 minutes and client context (fingerprint) information&lt;br /&gt;
Calendar c = Calendar.getInstance();&lt;br /&gt;
Date now = c.getTime();&lt;br /&gt;
c.add(Calendar.MINUTE, 15);&lt;br /&gt;
Date expirationDate = c.getTime();&lt;br /&gt;
Map&amp;lt;String, Object&amp;gt; headerClaims = new HashMap&amp;lt;&amp;gt;();&lt;br /&gt;
headerClaims.put(&amp;quot;typ&amp;quot;, &amp;quot;JWT&amp;quot;);&lt;br /&gt;
String token = JWT.create().withSubject(login)&lt;br /&gt;
   .withExpiresAt(expirationDate)&lt;br /&gt;
   .withIssuer(this.issuerID)&lt;br /&gt;
   .withIssuedAt(now)&lt;br /&gt;
   .withNotBefore(now)&lt;br /&gt;
   .withClaim(&amp;quot;userFingerprint&amp;quot;, userFingerprintHash)&lt;br /&gt;
   .withHeader(headerClaims)&lt;br /&gt;
   .sign(Algorithm.HMAC256(this.keyHMAC));&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Code to validate the token.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
// HMAC key - Block serialization and storage as String in JVM memory&lt;br /&gt;
private transient byte[] keyHMAC = ...;&lt;br /&gt;
&lt;br /&gt;
...&lt;br /&gt;
&lt;br /&gt;
//Retrieve the user fingerprint from the dedicated cookie&lt;br /&gt;
String userFingerprint = null;&lt;br /&gt;
if (request.getCookies() != null &amp;amp;&amp;amp; request.getCookies().length &amp;gt; 0) {&lt;br /&gt;
 List&amp;lt;Cookie&amp;gt; cookies = Arrays.stream(request.getCookies()).collect(Collectors.toList());&lt;br /&gt;
 Optional&amp;lt;Cookie&amp;gt; cookie = cookies.stream().filter(c -&amp;gt; &amp;quot;__Secure-Fgp&amp;quot;.equals(c.getName())).findFirst();&lt;br /&gt;
 if (cookie.isPresent()) {&lt;br /&gt;
   userFingerprint = cookie.get().getValue();&lt;br /&gt;
 }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
//Compute a SHA256 hash of the received fingerprint in cookie in order to compare it to the fingerprint hash stored in the token&lt;br /&gt;
MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
byte[] userFingerprintDigest = digest.digest(userFingerprint.getBytes(&amp;quot;utf-8&amp;quot;));&lt;br /&gt;
String userFingerprintHash = DatatypeConverter.printHexBinary(userFingerprintDigest);&lt;br /&gt;
&lt;br /&gt;
//Create a verification context for the token&lt;br /&gt;
JWTVerifier verifier = JWT.require(Algorithm.HMAC256(keyHMAC))&lt;br /&gt;
                              .withIssuer(issuerID)&lt;br /&gt;
                              .withClaim(&amp;quot;userFingerprint&amp;quot;, userFingerprintHash)&lt;br /&gt;
                              .build();&lt;br /&gt;
&lt;br /&gt;
//Verify the token, if the verification fail then a exception is throwed&lt;br /&gt;
DecodedJWT decodedToken = verifier.verify(token);&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Token explicit revocation by the user ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
This problem is inerrant to JWT token because a token become only invalid when it expires. The user has no built-in feature to explicitly revoke the validity of an token.&lt;br /&gt;
So, in case of steal, a user cannot revoke the token itself and then block the attacker.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
A way to protect is to implement a token blacklist that will be used to mimic the &amp;quot;logout&amp;quot; feature that exists with traditional session system.&lt;br /&gt;
&lt;br /&gt;
The blacklist will keep a digest (SHA-256 encoded in HEX) of the token with a revokation date, this, for a duration that must be superior to the duration validity of a issued token.&lt;br /&gt;
&lt;br /&gt;
When the user want to &amp;quot;logout&amp;quot; then it call a dedicated service that will add the provided user token to the blacklist resulting in a immediate invalidation of the token for further usage in the application.&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
==== Blacklist storage ====&lt;br /&gt;
&lt;br /&gt;
A database table with the following structure will used as central blacklist storage.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;sql&amp;quot;&amp;gt;&lt;br /&gt;
create table if not exists revoked_token(jwt_token_digest varchar(255) primary key, revokation_date timestamp default now());&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Token revocation management ====&lt;br /&gt;
&lt;br /&gt;
Code in charge of adding a token to the blacklist and check if a token is revoked.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
/**&lt;br /&gt;
* Handle the revokation of the token (logout).&lt;br /&gt;
* Use a DB in order to allow multiple instances to check for revoked token and allow cleanup at centralized DB level.&lt;br /&gt;
*/&lt;br /&gt;
public class TokenRevoker {&lt;br /&gt;
&lt;br /&gt;
 /** DB Connection */&lt;br /&gt;
 @Resource(&amp;quot;jdbc/storeDS&amp;quot;)&lt;br /&gt;
 private DataSource storeDS;&lt;br /&gt;
&lt;br /&gt;
 /**&lt;br /&gt;
  * Verify if a digest encoded in HEX of the ciphered token is present in the revokation table&lt;br /&gt;
  *&lt;br /&gt;
  * @param jwtInHex Token encoded in HEX&lt;br /&gt;
  * @return Presence flag&lt;br /&gt;
  * @throws Exception If any issue occur during communication with DB&lt;br /&gt;
  */&lt;br /&gt;
 public boolean isTokenRevoked(String jwtInHex) throws Exception {&lt;br /&gt;
     boolean tokenIsPresent = false;&lt;br /&gt;
     if (jwtInHex != null &amp;amp;&amp;amp; !jwtInHex.trim().isEmpty()) {&lt;br /&gt;
         //Decode the ciphered token&lt;br /&gt;
         byte[] cipheredToken = DatatypeConverter.parseHexBinary(jwtInHex);&lt;br /&gt;
&lt;br /&gt;
         //Compute a SHA256 of the ciphered token&lt;br /&gt;
         MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
         byte[] cipheredTokenDigest = digest.digest(cipheredToken);&lt;br /&gt;
         String jwtTokenDigestInHex = DatatypeConverter.printHexBinary(cipheredTokenDigest);&lt;br /&gt;
&lt;br /&gt;
         //Search token digest in HEX in DB&lt;br /&gt;
         try (Connection con = this.storeDS.getConnection()) {&lt;br /&gt;
             String query = &amp;quot;select jwt_token_digest from revoked_token where jwt_token_digest = ?&amp;quot;;&lt;br /&gt;
             try (PreparedStatement pStatement = con.prepareStatement(query)) {&lt;br /&gt;
                 pStatement.setString(1, jwtTokenDigestInHex);&lt;br /&gt;
                 try (ResultSet rSet = pStatement.executeQuery()) {&lt;br /&gt;
                     tokenIsPresent = rSet.next();&lt;br /&gt;
                 }&lt;br /&gt;
             }&lt;br /&gt;
         }&lt;br /&gt;
     }&lt;br /&gt;
&lt;br /&gt;
     return tokenIsPresent;&lt;br /&gt;
 }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 /**&lt;br /&gt;
  * Add a digest encoded in HEX of the ciphered token to the revokation token table&lt;br /&gt;
  *&lt;br /&gt;
  * @param jwtInHex Token encoded in HEX&lt;br /&gt;
  * @throws Exception If any issue occur during communication with DB&lt;br /&gt;
  */&lt;br /&gt;
 public void revokeToken(String jwtInHex) throws Exception {&lt;br /&gt;
     if (jwtInHex != null &amp;amp;&amp;amp; !jwtInHex.trim().isEmpty()) {&lt;br /&gt;
         //Decode the ciphered token&lt;br /&gt;
         byte[] cipheredToken = DatatypeConverter.parseHexBinary(jwtInHex);&lt;br /&gt;
&lt;br /&gt;
         //Compute a SHA256 of the ciphered token&lt;br /&gt;
         MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
         byte[] cipheredTokenDigest = digest.digest(cipheredToken);&lt;br /&gt;
         String jwtTokenDigestInHex = DatatypeConverter.printHexBinary(cipheredTokenDigest);&lt;br /&gt;
&lt;br /&gt;
         //Check if the token digest in HEX is already in the DB and add it if it is absent&lt;br /&gt;
         if (!this.isTokenRevoked(jwtInHex)) {&lt;br /&gt;
             try (Connection con = this.storeDS.getConnection()) {&lt;br /&gt;
                 String query = &amp;quot;insert into revoked_token(jwt_token_digest) values(?)&amp;quot;;&lt;br /&gt;
                 int insertedRecordCount;&lt;br /&gt;
                 try (PreparedStatement pStatement = con.prepareStatement(query)) {&lt;br /&gt;
                     pStatement.setString(1, jwtTokenDigestInHex);&lt;br /&gt;
                     insertedRecordCount = pStatement.executeUpdate();&lt;br /&gt;
                 }&lt;br /&gt;
                 if (insertedRecordCount != 1) {&lt;br /&gt;
                     throw new IllegalStateException(&amp;quot;Number of inserted record is invalid, 1 expected but is &amp;quot; + insertedRecordCount);&lt;br /&gt;
                 }&lt;br /&gt;
             }&lt;br /&gt;
         }&lt;br /&gt;
&lt;br /&gt;
     }&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Token information disclosure ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
This attack occur when a attacker access to a token (or a set of tokens) and extract information stored into it (JWT token information are base64 encoded at the basis) in order to obtains information about the system. Information can be for example the security roles, login format...&lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
A way to protect, is to cipher the token using for example a symetric algorithm.&lt;br /&gt;
&lt;br /&gt;
It's also important to protect the ciphered data against attack like [[Testing_for_Padding_Oracle_(OTG-CRYPST-002)|Padding Oracle]] or any other attack using cryptanalysis.&lt;br /&gt;
&lt;br /&gt;
In order to achieve all these goals, the algorithm ''AES-GCM'' can be used in conjunction with ''Additional Authentication Data (AAD)'' feature.&lt;br /&gt;
&lt;br /&gt;
A database can be used to store the ''NONCE'' and the ''AAD'' associated to a token.&lt;br /&gt;
&lt;br /&gt;
'''Note:'''&lt;br /&gt;
&lt;br /&gt;
Here ciphering is added mainly to hide internal information but it's very important to remember that the first protection against tampering of the JWT token is the signature so, the token signature and is verification must be always in place.&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
==== Token ciphering ====&lt;br /&gt;
&lt;br /&gt;
Database structure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;sql&amp;quot;&amp;gt;&lt;br /&gt;
create table if not exists nonce(jwt_token_digest varchar(255) primary key, gcm_nonce varchar(255) not null unique, gcm_aad varchar(255) not null unique);&lt;br /&gt;
create index if not exists idx_nonce on nonce(gcm_nonce);&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Code in charge of managing the ciphering.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
/**&lt;br /&gt;
* Handle ciphering and deciphering of the token using AES-GCM.&lt;br /&gt;
* Use a DB in order to link a GCM NONCE to a ciphered message and ensure that a NONCE is never reused&lt;br /&gt;
* and also allow use of several application nodes in load balancing.&lt;br /&gt;
*/&lt;br /&gt;
public class TokenCipher {&lt;br /&gt;
&lt;br /&gt;
   /** AES-GCM parameters */&lt;br /&gt;
   private static final int GCM_NONCE_LENGTH = 12; // in bytes&lt;br /&gt;
&lt;br /&gt;
   /** AES-GCM parameters */&lt;br /&gt;
   private static final int GCM_TAG_LENGTH = 16; // in bytes&lt;br /&gt;
&lt;br /&gt;
   /**Secure random generator */&lt;br /&gt;
   private final SecureRandom secRandom = new SecureRandom();&lt;br /&gt;
&lt;br /&gt;
   /** DB Connection */&lt;br /&gt;
   @Resource(&amp;quot;jdbc/storeDS&amp;quot;)&lt;br /&gt;
   private DataSource storeDS;&lt;br /&gt;
&lt;br /&gt;
   /**&lt;br /&gt;
    * Cipher a JWT&lt;br /&gt;
    * @param jwt Token to cipher&lt;br /&gt;
    * @param key Ciphering key&lt;br /&gt;
    * @return The ciphered version of the token encoded in HEX&lt;br /&gt;
    * @throws Exception If any issue occur during token ciphering operation&lt;br /&gt;
    */&lt;br /&gt;
   public String cipherToken(String jwt, byte[] key) throws Exception {&lt;br /&gt;
       //Verify parameters&lt;br /&gt;
       if(jwt == null || jwt.isEmpty() || key == null || key.length == 0){&lt;br /&gt;
           throw new IllegalArgumentException(&amp;quot;Both parameters must be specified !&amp;quot;);&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
       //Generate a NONCE&lt;br /&gt;
       //NOTE: As in the DB, the column to store the NONCE is flagged UNIQUE then the insert will fail&lt;br /&gt;
       //if the NONCE already exists, normally as we use the Java Secure Random implementation&lt;br /&gt;
       //it will never happen.&lt;br /&gt;
       final byte[] nonce = new byte[GCM_NONCE_LENGTH];&lt;br /&gt;
       secRandom.nextBytes(nonce);&lt;br /&gt;
&lt;br /&gt;
       //Prepare ciphering key from bytes provided&lt;br /&gt;
       SecretKey aesKey = new SecretKeySpec(key, 0, key.length, &amp;quot;AES&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
       //Setup Cipher&lt;br /&gt;
       Cipher cipher = Cipher.getInstance(&amp;quot;AES/GCM/NoPadding&amp;quot;, &amp;quot;SunJCE&amp;quot;);&lt;br /&gt;
       GCMParameterSpec spec = new GCMParameterSpec(GCM_TAG_LENGTH * 8, nonce);&lt;br /&gt;
       cipher.init(Cipher.ENCRYPT_MODE, aesKey, spec);&lt;br /&gt;
&lt;br /&gt;
       //Add &amp;quot;Additional Authentication Data&amp;quot; (AAD) in order to operate in AEAD mode - Generate it&lt;br /&gt;
       byte[] aad = new byte[32];&lt;br /&gt;
       secRandom.nextBytes(aad);&lt;br /&gt;
       cipher.updateAAD(aad);&lt;br /&gt;
&lt;br /&gt;
       //Cipher the token&lt;br /&gt;
       byte[] cipheredToken = cipher.doFinal(jwt.getBytes(&amp;quot;utf-8&amp;quot;));&lt;br /&gt;
&lt;br /&gt;
       //Compute a SHA256 of the ciphered token&lt;br /&gt;
       MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
       byte[] cipheredTokenDigest = digest.digest(cipheredToken);&lt;br /&gt;
&lt;br /&gt;
       //Store GCM NONCE and GCM AAD&lt;br /&gt;
       this.storeNonceAndAAD(DatatypeConverter.printHexBinary(nonce), DatatypeConverter.printHexBinary(aad),&lt;br /&gt;
       DatatypeConverter.printHexBinary(cipheredTokenDigest));&lt;br /&gt;
&lt;br /&gt;
       return DatatypeConverter.printHexBinary(cipheredToken);&lt;br /&gt;
   }&lt;br /&gt;
&lt;br /&gt;
   /**&lt;br /&gt;
    * Decipher a JWT&lt;br /&gt;
    * @param jwtInHex Token to decipher encoded in HEX&lt;br /&gt;
    * @param key Ciphering key&lt;br /&gt;
    * @return The token in clear text&lt;br /&gt;
    * @throws Exception If any issue occur during token deciphering operation&lt;br /&gt;
    */&lt;br /&gt;
   public String decipherToken(String jwtInHex, byte[] key) throws Exception{&lt;br /&gt;
       //Verify parameters&lt;br /&gt;
       if(jwtInHex == null || jwtInHex.isEmpty() || key == null || key.length == 0){&lt;br /&gt;
           throw new IllegalArgumentException(&amp;quot;Both parameters must be specified !&amp;quot;);&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
       //Decode the ciphered token&lt;br /&gt;
       byte[] cipheredToken = DatatypeConverter.parseHexBinary(jwtInHex);&lt;br /&gt;
&lt;br /&gt;
       //Compute a SHA256 of the ciphered token&lt;br /&gt;
       MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
       byte[] cipheredTokenDigest = digest.digest(cipheredToken);&lt;br /&gt;
&lt;br /&gt;
       //Read the GCM NONCE and GCM AAD associated from the DB&lt;br /&gt;
       Map&amp;lt;String,String&amp;gt; gcmInfos = this.readNonceAndAAD(DatatypeConverter.printHexBinary(cipheredTokenDigest));&lt;br /&gt;
       if(gcmInfos == null){&lt;br /&gt;
           throw new Exception(&amp;quot;Cannot found a NONCE and AAD associated to the token provided !&amp;quot;);&lt;br /&gt;
       }&lt;br /&gt;
       byte[] nonce = DatatypeConverter.parseHexBinary(gcmInfos.get(&amp;quot;NONCE&amp;quot;));&lt;br /&gt;
       byte[] aad = DatatypeConverter.parseHexBinary(gcmInfos.get(&amp;quot;AAD&amp;quot;));&lt;br /&gt;
&lt;br /&gt;
       //Prepare ciphering key from bytes provided&lt;br /&gt;
       SecretKey aesKey = new SecretKeySpec(key, 0, key.length, &amp;quot;AES&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
       //Setup Cipher&lt;br /&gt;
       Cipher cipher = Cipher.getInstance(&amp;quot;AES/GCM/NoPadding&amp;quot;, &amp;quot;SunJCE&amp;quot;);&lt;br /&gt;
       GCMParameterSpec spec = new GCMParameterSpec(GCM_TAG_LENGTH * 8, nonce);&lt;br /&gt;
       cipher.init(Cipher.DECRYPT_MODE, aesKey, spec);&lt;br /&gt;
&lt;br /&gt;
       //Add &amp;quot;Additional Authentication Data&amp;quot; (AAD) in order to operate in AEAD mode&lt;br /&gt;
       cipher.updateAAD(aad);&lt;br /&gt;
&lt;br /&gt;
       //Decipher the token&lt;br /&gt;
       byte[] decipheredToken = cipher.doFinal(cipheredToken);&lt;br /&gt;
&lt;br /&gt;
       return new String(decipheredToken);&lt;br /&gt;
   }&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
   /**&lt;br /&gt;
    * Store GCM NONCE and GCM AAD in the DB&lt;br /&gt;
    * @param nonceInHex Nonce encoded in HEX&lt;br /&gt;
    * @param aadInHex AAD encoded in HEX&lt;br /&gt;
    * @param jwtTokenDigestInHex SHA256 of the JWT ciphered token encoded in HEX&lt;br /&gt;
    * @throws Exception If any issue occur during communication with DB&lt;br /&gt;
    */&lt;br /&gt;
   private void storeNonceAndAAD(String nonceInHex, String aadInHex, String jwtTokenDigestInHex) throws Exception {&lt;br /&gt;
       try (Connection con = this.storeDS.getConnection()) {&lt;br /&gt;
           String query = &amp;quot;insert into nonce(jwt_token_digest, gcm_nonce, gcm_aad) values(?, ?, ?)&amp;quot;;&lt;br /&gt;
           int insertedRecordCount;&lt;br /&gt;
           try (PreparedStatement pStatement = con.prepareStatement(query)) {&lt;br /&gt;
               pStatement.setString(1, jwtTokenDigestInHex);&lt;br /&gt;
               pStatement.setString(2, nonceInHex);&lt;br /&gt;
               pStatement.setString(3, aadInHex);&lt;br /&gt;
               insertedRecordCount = pStatement.executeUpdate();&lt;br /&gt;
           }&lt;br /&gt;
           if (insertedRecordCount != 1) {&lt;br /&gt;
               throw new IllegalStateException(&amp;quot;Number of inserted record is invalid, 1 expected but is &amp;quot; + insertedRecordCount);&lt;br /&gt;
           }&lt;br /&gt;
       }&lt;br /&gt;
   }&lt;br /&gt;
&lt;br /&gt;
   /**&lt;br /&gt;
    * Read GCM NONCE and GCM AAD from the DB&lt;br /&gt;
    * @param jwtTokenDigestInHex SHA256 of the JWT ciphered token encoded in HEX for which we must read the NONCE and AAD&lt;br /&gt;
    * @return A dict containing the NONCE and AAD if they exists for the specified token&lt;br /&gt;
    * @throws Exception If any issue occur during communication with DB&lt;br /&gt;
    */&lt;br /&gt;
   private  Map&amp;lt;String,String&amp;gt; readNonceAndAAD(String jwtTokenDigestInHex) throws Exception{&lt;br /&gt;
       Map&amp;lt;String,String&amp;gt; gcmInfos = null;&lt;br /&gt;
       try (Connection con = this.storeDS.getConnection()) {&lt;br /&gt;
           String query = &amp;quot;select gcm_nonce, gcm_aad from nonce where jwt_token_digest = ?&amp;quot;;&lt;br /&gt;
           try (PreparedStatement pStatement = con.prepareStatement(query)) {&lt;br /&gt;
               pStatement.setString(1, jwtTokenDigestInHex);&lt;br /&gt;
               try (ResultSet rSet = pStatement.executeQuery()) {&lt;br /&gt;
                   while (rSet.next()) {&lt;br /&gt;
                       gcmInfos = new HashMap&amp;lt;&amp;gt;(2);&lt;br /&gt;
                       gcmInfos.put(&amp;quot;NONCE&amp;quot;, rSet.getString(1));&lt;br /&gt;
                       gcmInfos.put(&amp;quot;AAD&amp;quot;, rSet.getString(2));&lt;br /&gt;
                   }&lt;br /&gt;
               }&lt;br /&gt;
           }&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
       return gcmInfos;&lt;br /&gt;
   }&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Creation / Validation of the token ====&lt;br /&gt;
&lt;br /&gt;
Use of the token ciphering during the creation and the validation of the token.&lt;br /&gt;
&lt;br /&gt;
Load keys and setup cipher.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
//Load keys from configuration text files in order to avoid to store keys as String in JVM memory&lt;br /&gt;
private transient byte[] keyHMAC = Files.readAllBytes(Paths.get(&amp;quot;key-hmac.txt&amp;quot;));&lt;br /&gt;
private transient byte[] keyCiphering = Files.readAllBytes(Paths.get(&amp;quot;key-ciphering.txt&amp;quot;));&lt;br /&gt;
&lt;br /&gt;
//Load issuer ID from configuration text file&lt;br /&gt;
private transient String issuerID = Files.readAllLines(Paths.get(&amp;quot;issuer-id.txt&amp;quot;)).get(0);&lt;br /&gt;
&lt;br /&gt;
//Init token ciphering handler&lt;br /&gt;
TokenCipher tokenCipher = new TokenCipher();&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Token creation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
 //Generate a random string that will constitute the fingerprint for this user&lt;br /&gt;
 byte[] randomFgp = new byte[50];&lt;br /&gt;
 this.secureRandom.nextBytes(randomFgp);&lt;br /&gt;
 String userFingerprint = DatatypeConverter.printHexBinary(randomFgp);&lt;br /&gt;
&lt;br /&gt;
 //Add the fingerprint in a hardened cookie - Add cookie manually because SameSite attribute is not supported by javax.servlet.http.Cookie class&lt;br /&gt;
 String fingerprintCookie = &amp;quot;__Secure-Fgp=&amp;quot; + userFingerprint + &amp;quot;; SameSite=Strict; HttpOnly; Secure&amp;quot;;&lt;br /&gt;
 response.addHeader(&amp;quot;Set-Cookie&amp;quot;, fingerprintCookie);&lt;br /&gt;
&lt;br /&gt;
 //Compute a SHA256 hash of the fingerprint in order to store the fingerprint hash (instead of the raw value) in the token&lt;br /&gt;
 //to prevent an XSS to be able to read the fingerprint and set the expected cookie itself&lt;br /&gt;
 MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
 byte[] userFingerprintDigest = digest.digest(userFingerprint.getBytes(&amp;quot;utf-8&amp;quot;));&lt;br /&gt;
 String userFingerprintHash = DatatypeConverter.printHexBinary(userFingerprintDigest);&lt;br /&gt;
&lt;br /&gt;
 //Create the token with a validity of 15 minutes and client context (fingerprint) information&lt;br /&gt;
 Calendar c = Calendar.getInstance();&lt;br /&gt;
 Date now = c.getTime();&lt;br /&gt;
 c.add(Calendar.MINUTE, 15);&lt;br /&gt;
 Date expirationDate = c.getTime();&lt;br /&gt;
 Map&amp;lt;String, Object&amp;gt; headerClaims = new HashMap&amp;lt;&amp;gt;();&lt;br /&gt;
 headerClaims.put(&amp;quot;typ&amp;quot;, &amp;quot;JWT&amp;quot;);&lt;br /&gt;
 String token = JWT.create().withSubject(login)&lt;br /&gt;
     .withExpiresAt(expirationDate)&lt;br /&gt;
     .withIssuer(this.issuerID)&lt;br /&gt;
     .withIssuedAt(now)&lt;br /&gt;
     .withNotBefore(now)&lt;br /&gt;
     .withClaim(&amp;quot;userFingerprint&amp;quot;, userFingerprintHash)&lt;br /&gt;
     .withHeader(headerClaims)&lt;br /&gt;
     .sign(Algorithm.HMAC256(this.keyHMAC));&lt;br /&gt;
//Cipher the token&lt;br /&gt;
String cipheredToken = tokenCipher.cipherToken(token, keyCiphering);&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Token validation.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
//Decipher the token&lt;br /&gt;
String token = tokenCipher.decipherToken(cipheredToken, keyCiphering);&lt;br /&gt;
&lt;br /&gt;
//Retrieve the user fingerprint from the dedicated cookie&lt;br /&gt;
String userFingerprint = null;&lt;br /&gt;
if (request.getCookies() != null &amp;amp;&amp;amp; request.getCookies().length &amp;gt; 0) {&lt;br /&gt;
 List&amp;lt;Cookie&amp;gt; cookies = Arrays.stream(request.getCookies()).collect(Collectors.toList());&lt;br /&gt;
 Optional&amp;lt;Cookie&amp;gt; cookie = cookies.stream().filter(c -&amp;gt; &amp;quot;__Secure-Fgp&amp;quot;.equals(c.getName())).findFirst();&lt;br /&gt;
 if (cookie.isPresent()) {&lt;br /&gt;
   userFingerprint = cookie.get().getValue();&lt;br /&gt;
 }&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
//Compute a SHA256 hash of the received fingerprint in cookie in order to compare it to the fingerprint hash stored in the token&lt;br /&gt;
MessageDigest digest = MessageDigest.getInstance(&amp;quot;SHA-256&amp;quot;);&lt;br /&gt;
byte[] userFingerprintDigest = digest.digest(userFingerprint.getBytes(&amp;quot;utf-8&amp;quot;));&lt;br /&gt;
String userFingerprintHash = DatatypeConverter.printHexBinary(userFingerprintDigest);&lt;br /&gt;
&lt;br /&gt;
//Decipher the token&lt;br /&gt;
String token = this.tokenCipher.decipherToken(cipheredToken, this.keyCiphering);&lt;br /&gt;
//Create a verification context for the token&lt;br /&gt;
JWTVerifier verifier = JWT.require(Algorithm.HMAC256(this.keyHMAC))&lt;br /&gt;
   .withIssuer(this.issuerID)&lt;br /&gt;
   .withClaim(&amp;quot;userFingerprint&amp;quot;, userFingerprintHash)&lt;br /&gt;
   .build();&lt;br /&gt;
&lt;br /&gt;
//Verify the token, if the verification fail then a exception is throwed&lt;br /&gt;
DecodedJWT decodedToken = verifier.verify(token);&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Token storage on client side ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
It's occur when a application store the token in a way allowing this one to be:&lt;br /&gt;
&lt;br /&gt;
* Automatically sent by the browser (''Cookie'' storage).&lt;br /&gt;
* Retrieved even if the browser is restarted (Use of browser ''localStorage'' container).&lt;br /&gt;
* Retrieved in case of [[XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet|XSS]] issue (Cookie accessible to JavaScript code or Token stored in browser local/session storage). &lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
# Store the token using the browser ''sessionStorage'' container.&lt;br /&gt;
# Add it as a ''Bearer'' with JavaScript when calling services.&lt;br /&gt;
# Add [[#Token sidejacking|fingerprint]] information to the token.&lt;br /&gt;
&lt;br /&gt;
By storing the token in browser ''sessionStorage'' container it expose the token to be steal in case of XSS issue. However, fingerprint added to the token prevent reuse of the stolen token by the attacker on his machine. To close a maximum of exploitation surfaces for an attacker, add a browser [[OWASP_Secure_Headers_Project#csp|Content Security Policy]] to harden the execution context.&lt;br /&gt;
&lt;br /&gt;
''Note:''&lt;br /&gt;
&lt;br /&gt;
* The remaining case is when a attacker use the user browsing context as a proxy to use the target application through the legitimate user but the Content Security Policy can prevent communication with non expected domains.&lt;br /&gt;
* It's also possible to implements the authentication service in a way that the token is issued within a hardened cookie, but in this case, a protection against [[Cross-Site_Request_Forgery_(CSRF)_Prevention_Cheat_Sheet|Cross-Site Request Forgery]] attack must be implemented.&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
JavaScript code to store the token after authentication.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;javascript&amp;quot;&amp;gt;&lt;br /&gt;
 /* Handle request for JWT token and local storage*/&lt;br /&gt;
 function getToken(){&lt;br /&gt;
     var login = $(&amp;quot;#login&amp;quot;).val();&lt;br /&gt;
     var postData = &amp;quot;login=&amp;quot; + encodeURIComponent(login) + &amp;quot;&amp;amp;password=test&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
     $.post(&amp;quot;/services/authenticate&amp;quot;, postData,function (data){&lt;br /&gt;
         if(data.status == &amp;quot;Authentication successful !&amp;quot;){&lt;br /&gt;
             ...&lt;br /&gt;
             sessionStorage.setItem(&amp;quot;token&amp;quot;, data.token);&lt;br /&gt;
         }else{&lt;br /&gt;
             ...&lt;br /&gt;
             sessionStorage.removeItem(&amp;quot;token&amp;quot;);&lt;br /&gt;
         }&lt;br /&gt;
     })&lt;br /&gt;
     .fail(function(jqXHR, textStatus, error){&lt;br /&gt;
             ...&lt;br /&gt;
         sessionStorage.removeItem(&amp;quot;token&amp;quot;);&lt;br /&gt;
     });&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
JavaScript code to add the token as ''Bearer'' when calling a service, for example a service to validate token here.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;javascript&amp;quot;&amp;gt;&lt;br /&gt;
 /* Handle request for JWT token validation */&lt;br /&gt;
 function validateToken(){&lt;br /&gt;
     var token = sessionStorage.getItem(&amp;quot;token&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
     if(token == undefined || token == &amp;quot;&amp;quot;){&lt;br /&gt;
         $(&amp;quot;#infoZone&amp;quot;).removeClass();&lt;br /&gt;
         $(&amp;quot;#infoZone&amp;quot;).addClass(&amp;quot;alert alert-warning&amp;quot;);&lt;br /&gt;
         $(&amp;quot;#infoZone&amp;quot;).text(&amp;quot;Obtain a JWT token first :)&amp;quot;);&lt;br /&gt;
         return;&lt;br /&gt;
     }&lt;br /&gt;
&lt;br /&gt;
     $.ajax({&lt;br /&gt;
         url: &amp;quot;/services/validate&amp;quot;,&lt;br /&gt;
         type: &amp;quot;POST&amp;quot;,&lt;br /&gt;
         beforeSend: function(xhr) {&lt;br /&gt;
             xhr.setRequestHeader(&amp;quot;Authorization&amp;quot;, &amp;quot;bearer &amp;quot; + token);&lt;br /&gt;
         },&lt;br /&gt;
         success: function(data) {&lt;br /&gt;
           ...&lt;br /&gt;
         },&lt;br /&gt;
         error: function(jqXHR, textStatus, error) {&lt;br /&gt;
           ...&lt;br /&gt;
         },&lt;br /&gt;
     });&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Token weak secret ==&lt;br /&gt;
&lt;br /&gt;
=== Symptom ===&lt;br /&gt;
&lt;br /&gt;
It's occur when the secret used in case of HMAC SHA256 algorithm used for the token signature is weak and can be bruteforced.&lt;br /&gt;
&lt;br /&gt;
The result is the capacity for an attacker to forge arbitrary valid token from a signature point of view.&lt;br /&gt;
&lt;br /&gt;
See [https://www.notsosecure.com/crafting-way-json-web-tokens/ here] for an example.&lt;br /&gt;
&lt;br /&gt;
=== How to prevent ===&lt;br /&gt;
&lt;br /&gt;
Use a very strong secret: Alphanumeric (mixed case) + special characters.&lt;br /&gt;
&lt;br /&gt;
As it's a computer processing only, the size of the secret can be superior to 50 positions.&lt;br /&gt;
&lt;br /&gt;
Secret example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;A&amp;amp;'/}Z57M(2hNg=;LE?~]YtRMS5(yZ&amp;lt;vcZTA3N-($&amp;gt;2j:ZeX-BGftaVk`)jKP~q?,jk)EMbgt*kW'(&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To evaluate the strength of the secret used for your token signature, you can apply a password dictionary attack on the token combined with the JWT API to facilitate the implementation of a breaker.&lt;br /&gt;
&lt;br /&gt;
Password dictionaries can be found for example [https://wiki.skullsecurity.org/Passwords here].&lt;br /&gt;
&lt;br /&gt;
=== Implementation example ===&lt;br /&gt;
&lt;br /&gt;
Code in charge of testing a secret against a JWT token test base.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
 /**&lt;br /&gt;
 * Test if a secret match the secret used to sign the token&lt;br /&gt;
 *&lt;br /&gt;
 * @param token Source JWT token (test base)&lt;br /&gt;
 * @param secret Secret to test&lt;br /&gt;
 * @return The token decoded if the secret matche otherwise return null&lt;br /&gt;
 */&lt;br /&gt;
private DecodedJWT checkSecret(String token, String secret) {&lt;br /&gt;
     DecodedJWT t = null;&lt;br /&gt;
     try {&lt;br /&gt;
         Algorithm algorithm = Algorithm.HMAC256(secret);&lt;br /&gt;
         JWTVerifier verifier = JWT.require(algorithm).build();&lt;br /&gt;
         t = verifier.verify(token);&lt;br /&gt;
     } catch (JWTVerificationException | UnsupportedEncodingException e) {&lt;br /&gt;
         //ignore...&lt;br /&gt;
     }&lt;br /&gt;
     return t;&lt;br /&gt;
 }&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Code snippet to evaluate the token test base on the secret dictionary.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;syntaxhighlight lang=&amp;quot;java&amp;quot;&amp;gt;&lt;br /&gt;
final String tokenTestBase = ...;&lt;br /&gt;
final String[] secret = new String[1];&lt;br /&gt;
final DecodedJWT[] decodedToken = new DecodedJWT[1];&lt;br /&gt;
List&amp;lt;String&amp;gt; secrets = Files.readAllLines(Paths.get(&amp;quot;secrets-dictionary.txt&amp;quot;));&lt;br /&gt;
secrets.parallelStream().forEach(s -&amp;gt; {&lt;br /&gt;
 DecodedJWT tentative = checkSecret(tokenTestBase, s);&lt;br /&gt;
 if (tentative != null) {&lt;br /&gt;
   secret[0] = s;&lt;br /&gt;
   decodedToken[0] = tentative;&lt;br /&gt;
 }&lt;br /&gt;
});&lt;br /&gt;
&amp;lt;/syntaxhighlight&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use dedicated tools ===&lt;br /&gt;
&lt;br /&gt;
You can also used [https://github.com/hashcat/hashcat/issues/1057#issuecomment-279651700 JohnTheRipper] to perform the password dictionary attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Support for [https://github.com/hashcat/hashcat/issues/1057 Hashcat] is pending.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
Jim Manico - jim.manico@owasp.org&lt;br /&gt;
&lt;br /&gt;
Dominique Righetto - dominique.righetto@owasp.org&lt;br /&gt;
&lt;br /&gt;
Paul Ionescu - paul.ionescu@owasp.org&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=197023</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=197023"/>
				<updated>2015-07-06T00:51:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Orange County|extra=The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Orange_County|emailarchives=http://lists.owasp.org/pipermail/owasp-Orange_County}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United States]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196930</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196930"/>
				<updated>2015-07-02T21:14:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, click the logo below to find out more about our chapter.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Next Chapter Meeting ===&lt;br /&gt;
Thursday, July 30, 2015 at 6:00 PM&lt;br /&gt;
&lt;br /&gt;
==== Development with web2py ====&lt;br /&gt;
&lt;br /&gt;
Free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. Written and programmable in Python.&lt;br /&gt;
&lt;br /&gt;
Massimo Di Pierro (Professor of Computer Science at DePaul University, Chicago)&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196929</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196929"/>
				<updated>2015-07-02T21:13:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: /* Next Chapter Meeting = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Next Chapter Meeting ===&lt;br /&gt;
Thursday, July 30, 2015 at 6:00 PM&lt;br /&gt;
&lt;br /&gt;
==== Development with web2py ====&lt;br /&gt;
&lt;br /&gt;
Free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. Written and programmable in Python.&lt;br /&gt;
&lt;br /&gt;
Massimo Di Pierro (Professor of Computer Science at DePaul University, Chicago)&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196928</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196928"/>
				<updated>2015-07-02T21:13:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: /* Next Chapter Meeting = */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Next Chapter Meeting ====&lt;br /&gt;
Thursday, July 30, 2015 at 6:00 PM&lt;br /&gt;
&lt;br /&gt;
===== Development with web2py ====&lt;br /&gt;
&lt;br /&gt;
Free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. Written and programmable in Python.&lt;br /&gt;
&lt;br /&gt;
Massimo Di Pierro (Professor of Computer Science at DePaul University, Chicago)&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196927</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196927"/>
				<updated>2015-07-02T21:13:07Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;br /&gt;
&lt;br /&gt;
=== Next Chapter Meeting ====&lt;br /&gt;
Thursday, July 30, 2015 at 6:00 PM&lt;br /&gt;
&lt;br /&gt;
===== Development with web2py =====&lt;br /&gt;
&lt;br /&gt;
Free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. Written and programmable in Python.&lt;br /&gt;
&lt;br /&gt;
Massimo Di Pierro (Professor of Computer Science at DePaul University, Chicago)&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196926</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196926"/>
				<updated>2015-07-02T21:12:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;br /&gt;
&lt;br /&gt;
Next Chapter Meeting:&lt;br /&gt;
Thursday, July 30, 2015 at 6:00 PM&lt;br /&gt;
&lt;br /&gt;
Development with web2py:&lt;br /&gt;
&lt;br /&gt;
Free open source full-stack framework for rapid development of fast, scalable, secure and portable database-driven web-based applications. Written and programmable in Python.&lt;br /&gt;
&lt;br /&gt;
Massimo Di Pierro (Professor of Computer Science at DePaul University, Chicago)&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196925</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196925"/>
				<updated>2015-07-02T20:58:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up.&lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196924</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196924"/>
				<updated>2015-07-02T20:58:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy. &lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris, ron.perris@owasp.org&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196923</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196923"/>
				<updated>2015-07-02T20:57:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy. &lt;br /&gt;
&lt;br /&gt;
[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris &amp;lt;ron.perris@owasp.org&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196922</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196922"/>
				<updated>2015-07-02T20:57:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&lt;br /&gt;
Our Current Chapter Leader is Ron Perris &amp;lt;ron.perris@owasp.org&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196921</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196921"/>
				<updated>2015-07-02T20:57:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check out more information on our chapter at [http://www.meetup.com/OWASP-OC Meetup]&lt;br /&gt;
&lt;br /&gt;
= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196920</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196920"/>
				<updated>2015-07-02T20:56:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check out more information on our chapter at [http://www.meetup.com/OWASP-OC Meetup]&lt;br /&gt;
&lt;br /&gt;
= OWASP Orange County California =&lt;br /&gt;
The Orange County OWASP Chapter uses a community building website known as Meet-Up, if you are unable to access it from your work computer as a result of filtering of social sites we recommend that you come to one of our meetings and ask about how to use a proxy. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Are you looking for [https://www.owasp.org/index.php/NYC/training/may2015 ISC2 CSSLP Training in New York City?] simply [https://www.owasp.org/index.php/NYC/training/may2015 CLICK HERE]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196919</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196919"/>
				<updated>2015-07-02T20:51:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: Replaced content with &amp;quot;Check out more information on our chapter at [http://www.meetup.com/OWASP-OC Meetup]&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check out more information on our chapter at [http://www.meetup.com/OWASP-OC Meetup]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196918</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196918"/>
				<updated>2015-07-02T20:46:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check out more information on our chapter at [http://www.meetup.com/OWASP-OC Meetup]&lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history.&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196917</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=196917"/>
				<updated>2015-07-02T20:45:55Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Check out more information on our chapter at [http://www.meetup.com/owaspoc/ Meetup]&lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history.&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=183335</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=183335"/>
				<updated>2014-10-06T19:35:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: /* Involvement in OWASP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Professional Bio == &lt;br /&gt;
&lt;br /&gt;
Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;br /&gt;
&lt;br /&gt;
== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Organizer of [https://2014.appseccalifornia.org/ AppSecCalifornia 2014] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=183334</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=183334"/>
				<updated>2014-10-06T19:28:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: /* Involvement in OWASP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Professional Bio == &lt;br /&gt;
&lt;br /&gt;
Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;br /&gt;
&lt;br /&gt;
== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2014] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178741</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178741"/>
				<updated>2014-07-14T17:12:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Professional Bio == &lt;br /&gt;
&lt;br /&gt;
Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;br /&gt;
&lt;br /&gt;
== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2013] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178738</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178738"/>
				<updated>2014-07-14T17:06:21Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Professional Bio == &lt;br /&gt;
&lt;br /&gt;
Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;br /&gt;
&lt;br /&gt;
== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* Relaunched the OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2013] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178737</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178737"/>
				<updated>2014-07-14T17:05:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* Relaunched the OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2013] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;br /&gt;
&lt;br /&gt;
== Professional Bio == &lt;br /&gt;
&lt;br /&gt;
Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178735</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178735"/>
				<updated>2014-07-14T17:01:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: Updated bio&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* Relaunched the OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2013] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;br /&gt;
&lt;br /&gt;
Bio: Ron Perris is currently an Advisor for SecureReady, a phishing simulation software company. Formerly, Ron worked in product development executive roles for several information security companies. Ron spent 6 years with Sweden’s Outpost24, as CTO for 4 of those years. At Outpost24 Ron lead product development and software engineering. With Outpost24 he worked with over 2000 organizations globally to help them manage their network, systems and application security. Ron also worked for NTOBJECTives and Whitehat Security to help companies improve their application security programs. Ron joined OWASP in 2013 as the Orange County Chapter Leader and has worked through the chapter to carry out the OWASP mission locally.&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178321</id>
		<title>WASPY Awards 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178321"/>
				<updated>2014-07-09T00:08:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: Undo revision 178320 by Ron Perris (talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER-2014.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2014'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Timeline'''==&lt;br /&gt;
&lt;br /&gt;
June 10 - Call for Nominees '''Now Open!''' Submit your nominee [http://www.tfaforms.com/284578 here]&lt;br /&gt;
&lt;br /&gt;
June 23 - Reminder Email Will be Sent For Call for Nominees&lt;br /&gt;
&lt;br /&gt;
June 30 - Call for Nominees Closes&lt;br /&gt;
&lt;br /&gt;
July 7 - Announcement of Nominees Per Category&lt;br /&gt;
&lt;br /&gt;
July 15 - Deadline For Profile Picture and Bio to be Submitted&lt;br /&gt;
&lt;br /&gt;
July 31 - Paid Membership Deadline - '''NOT SURE IF YOU ARE A CURRENT MEMBER?''' &lt;br /&gt;
&lt;br /&gt;
August 8 - Voting Opens&lt;br /&gt;
&lt;br /&gt;
August 26 - Voting Closes&lt;br /&gt;
&lt;br /&gt;
August 27 - Announcement of Winners&lt;br /&gt;
&lt;br /&gt;
September 16-19 - Awards Ceremony at AppSecUSA 2014 in Denver, CO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Categories'''==&lt;br /&gt;
&lt;br /&gt;
1. Best Chapter Leader - active chapter leader to be recognized for their contributions to the growth and organization of the chapter.&lt;br /&gt;
&lt;br /&gt;
2. Best Project Leader  - active project leader to be recognized for the development of their project.&lt;br /&gt;
&lt;br /&gt;
3. Best Mission Outreach - individual who contributed to the growth of the organization through outreach to the community. &lt;br /&gt;
&lt;br /&gt;
4. Best New Community Supporter &amp;quot;Rookie of the Year&amp;quot; - individual (no requirement to be a leader) who has contributed to any chapter, project,  initiative, or other OWASP activity.&lt;br /&gt;
&lt;br /&gt;
5. Best Platform Supporter - (OWASP Staff Vote) individual who positively contributes to the reinforcement of the OWASP platform.&lt;br /&gt;
&lt;br /&gt;
=='''Rules:==&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote.&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until July 7, 2014&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated &lt;br /&gt;
&lt;br /&gt;
=='''Sponsorship Opportunities'''==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!  To learn more about how you can support these awards please see our [http://owasp.com/images/1/1a/2014_WASPY_Sponsorship_Doc.pdf '''Sponsorship Opportunities'''.]&lt;br /&gt;
&lt;br /&gt;
'''Become involved and support the WASPY Awards today!'''&lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sen Ueno]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;He is OWASP Japan Co-Chapter leader and leading OWASP AppSec APAC.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Riotaro Okada]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;The foundation of the OWASP Japan local chapter, its rapid growth to reaching over 2,000 participants in local chapter meetings in the first 2 years and the massive success of AppSec APAC 2014 in Tokyo would not have been possible without the passion and full commitment to the OWASP cause demonstrated by Rio.  He is definitely a role model for the OWASP community, especially in the Asia Pacific region which in general is lacking strong and effective leadership, and there is no doubt in my mind he is the most suited candidate for Best Chapter Leader based on the efforts he's contributed in the past few years as well as the success and results of those efforts.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He holds local chapter meeting(we call OWASP Night), and every event is full capacity and good topics. And he organized successful event, which is OWASP APAC 2014 in this year.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Rio has done an amazing job building up our Japan chapters. &lt;br /&gt;
Over the last few years with huge community meetings, new chapters in Japan and a lot of community activity. &lt;br /&gt;
This is truely outstanding!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Ron_Perris Ron Perris]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Orange County]||align=&amp;quot;center&amp;quot;|&amp;quot;Ron relaunched the OWASP Orange County Chapter. Grew the chapter leadership organization to five chapter leaders from three. Increased meeting frequency from bi-yearly to monthly. Held 13 meetings in the last twelve months. Attracted 140 new attendees to chapter meetings. Established a culture of vendor neutrality and speaker selection based on merit.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sebastien Deleersnyder]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Belgium]||align=&amp;quot;center&amp;quot;|&amp;quot;He does a lot of work, not only for the chapter meetings but also for the BeNeLux days. He is very approachable and open for suggestions.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;&amp;quot;I would like to nominate Jonathan for his involvement in:&lt;br /&gt;
1) Successfully leading the Montreal Chapter. Even when personally absent and traveling on another continent, Jonathan has remotely managed the overall execution of the local chapter meetings.&lt;br /&gt;
2) His valuable contribution to the OWASP Media project, that undoubtedly brings the &amp;quot;&amp;quot;O&amp;quot;&amp;quot; of OWASP to audiences unable to attend meetings&lt;br /&gt;
3) Jonathan has contributed and invested efforts on the &amp;quot;&amp;quot;outreach&amp;quot;&amp;quot; objective, announced by the board as a core objective for 2013-2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jeremy Long]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]||align=&amp;quot;center&amp;quot;|&amp;quot;Reasons Jeremy Long and his Dependency Check deserve a WASPY award:&lt;br /&gt;
&lt;br /&gt;
- His OWASP Dependency Check is a solution to the problem of third party libraries that needed to be solved. &lt;br /&gt;
- Jeremy's work on D.C. is steady.  He has put a lot of work into this project&lt;br /&gt;
- Jeremy has successfully involved others to help work on the project.  It is a model open source project.&lt;br /&gt;
- He has been responsive and helpful to questions and created a nice community of users.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Achim Hoffmann]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/O-Saft OWASP O-Saft]||align=&amp;quot;center&amp;quot;|&amp;quot;Achim is the project leader of O-Saft (https://www.owasp.org/index.php/O-Saft). O-Saft is a tool to analyze the SSL configuration of a web or mail server. It is a tool with a very specific focus, not a swiss army knife but there is a need for exactly this tool. Achim started the development at the beginning of the big SSL-crisis (concerns about weak ciphers, cipher orders, perfect forward secrecy, ). Without a specialized tool it is impossible to find out the SSL behaviour of a given server. Achim's interest was focused on facts only. The outcome of the tool is not a subjective rating, score or grade, only  facts about the config. Achim goals were exactness, comprehensiveness and impartiality which he achieved with his project. He was open to suggestions and could win additional highly motivated and skilled contributors. He is not a marketing driven project leader instead of that he gives talks and trainings about SSL and O-Saft (Munich Chapter, OWASP AppSec EU 2014 Cambridge) to share his knowledge.&lt;br /&gt;
 &lt;br /&gt;
I would like to nominate Achim for the OWASP Project Leader 2014 because his project fulfills the OWASP mission in a perfect way. It makes the security of SSL servers visible. There is no free avaiblabe tool beside O-Saft with a comparable comprehensive scope and ability to execute. It is completely free of commercial interests or commercial &amp;quot;&amp;quot;added values&amp;quot;&amp;quot;, distributed under a GPL.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Tokuji Akamine]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSecurity_Project  OWASP XSecurity Project]||align=&amp;quot;center&amp;quot;|&amp;quot;The idea(feature) of this security tool is excellent, especially these two points below.&lt;br /&gt;
Usually security is difficult and burdensome. But this security tool makes security much easier and less burdensome to iOS app developers.&lt;br /&gt;
1. Provide developer friendly security features on top of Xcode to assist developers to learn iOS app security.(Quick Security Help with built-in Security Guidelines)&lt;br /&gt;
2. Avoid making vulnerabilities during development.(Real-time Vulnerability Notifications)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He provides to assist iOS developers to develop secure iOS apps and  a security plugin for Xcode plus clang static analyzer checkers for iOS application development. This plugin will be to reduce the vulnerability made during development by detecting the vulnerability.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Matteo Meucci]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Matteo collaborates in OWASP from 2002.He founded the Italian Chapter in 2005.He candidates for the Autum of Code in 2006 to start a new project regarding the Testing Guide. He leads the OWASP Testing from 2006 (v2) to now with the publishing of Testing Guide v4 in the next weeks. He was capable to attract and manage more than 50 people to create the new Guide. Nowadays the Testing Guide is the most recognized project of OWASP with great contents and high quality delivery.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: John Melton]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_AppSensor OWASP AppSensor]||align=&amp;quot;center&amp;quot;|&amp;quot;John has working tirelessly, and mostly invisible behind the scenes in developing the OWASP AppSensor project. While others have lead the charge on the OWASP AppSensor documentation project, for the most part, John has been the sole contributor to the OWASP AppSensor source code.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Spyros Gasteratos]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Spyros has been involved in OWASP since 2010, contributing more and more time as years go by. He began by volunteering for OWASP AppSec Research 2012, where he was in charge for coordinating a team of more than 20 volunteers. For the past 1.5 year he as been co-leading the OWASP Hackademic Challenges Project. During that time he has managed to take the project into the next level both by producing code and by mentoring GSOC students. Spyros has spent a tremendous amount of time in coding, fixing bugs, setting up and maintaining a live version of Hackademic. Undoubtedly, without his efforts the project would have become dormant.Furthermore, he is also helping in other OWASP initiatives, e.g. by participating in the Open Source Showcase, presenting Hackademic and OWASP at the FOSDEM conference in Belgium and by setting up the new &amp;quot;&amp;quot;OWASP Code Wind&amp;quot;&amp;quot; project that aims to bring more student contributions to OWASP.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Mostafa Siraj]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Cairo Cairo Chapter]||align=&amp;quot;center&amp;quot;|&amp;quot;Mostafa did a great job helping our chapter (Cairo Chapter), here are summary of his contribution: - He had a great talk in the latest chapter event, he talk about AppSec US summarizing the conference technical sessions (Mostafa attended the 2013 conference and won the technical competition there), - Mostafa is one of the main members of a small group of AppSec expertise from Cairo chapter, this group is engaged now for preparing security awareness training program for all governmental developers in Egypt, I highly recommend him,&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Category:OWASP_Video OWASP Videos]||align=&amp;quot;center&amp;quot;|&amp;quot;Because he is helping spread OWASP message through this videos and live streaming events&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSecUSA2013 Team]||align=&amp;quot;center&amp;quot;|[http://2013.appsecusa.org/ AppSecUSA 2013 Team]||align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best New Community Supporter&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSec APAC 2014 Team]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014]||align=&amp;quot;center&amp;quot;|&amp;quot;Despite it being the first time that AppSec was held in Japan and despite the lack of experience in planning and organizing a large scale international conference, the volunteers on the AppSec APAC 2014 team came together and went above and beyond their responsibilities to make AppSec APAC 2014 in Tokyo a stunning success.  It was by far the most successful AppSec in the Asia Pacific region and achieved an unprecedented level of profitability.  The vast majority of the sponsors were Japanese companies and many of the attendees were Japanese.  The ability to achieve this despite the relatively low level of awareness of the OWASP brand in Japan was definitely due to the hard work and dedication of the AppSec APAC 2014 team who worked around the clock to make the event a success.  Considering that there were no applicants to hold AppSec APAC 2015 despite the tremendous success in Tokyo, recognizing the contributions of the AppSec APAC 2015 team would definitely give a strong message motivating the Asia Pacific community and facilitate future OWASP initiatives in the region.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Robert Dracea]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=WELCOME AppSec Asia Pac 2014] [https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been excellent, since we have started preparation for the Global AppSec APAC2014. Based on his passion to promote valuable information regards to information security in Japan, he contributed his bilingual ability to prepare and preside AppSec APAC in Tokyo.  He committed the local committee by attended every weekly meeting for more than 9 months from his office and his home. Surely, thanks to his help, potential language barrier were completely broken in  the conference. This experience of us will be a good example for OWASP organizers especially in Asia Pacific area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Takanori Nakanowatari]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014][https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been awesome, since we have started preparation for the Global AppSec APAC2014. His experience which attended a few AppSecs were very helpful to organize the newly AppSec in Tokyo, and he committee the local committee by attended every weekly meeting for more than 9 months from his office and his home. Moreover, thanks to his advice, 2 OWASP ZAP evangelists were born in Japan at the timing of AppSec APAC 2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Beth Guth]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/New_Jersey_South South New Jersey]||align=&amp;quot;center&amp;quot;|&amp;quot;She started South New Jersey chapter with energy and enthusiasm bringing together people from builders, breakers and defenders. Self-starter&amp;quot;&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178320</id>
		<title>WASPY Awards 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178320"/>
				<updated>2014-07-09T00:06:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER-2014.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2014'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Timeline'''==&lt;br /&gt;
&lt;br /&gt;
June 10 - Call for Nominees '''Now Open!''' Submit your nominee [http://www.tfaforms.com/284578 here]&lt;br /&gt;
&lt;br /&gt;
June 23 - Reminder Email Will be Sent For Call for Nominees&lt;br /&gt;
&lt;br /&gt;
June 30 - Call for Nominees Closes&lt;br /&gt;
&lt;br /&gt;
July 7 - Announcement of Nominees Per Category&lt;br /&gt;
&lt;br /&gt;
July 15 - Deadline For Profile Picture and Bio to be Submitted&lt;br /&gt;
&lt;br /&gt;
July 31 - Paid Membership Deadline - '''NOT SURE IF YOU ARE A CURRENT MEMBER?''' &lt;br /&gt;
&lt;br /&gt;
August 8 - Voting Opens&lt;br /&gt;
&lt;br /&gt;
August 26 - Voting Closes&lt;br /&gt;
&lt;br /&gt;
August 27 - Announcement of Winners&lt;br /&gt;
&lt;br /&gt;
September 16-19 - Awards Ceremony at AppSecUSA 2014 in Denver, CO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Categories'''==&lt;br /&gt;
&lt;br /&gt;
1. Best Chapter Leader - active chapter leader to be recognized for their contributions to the growth and organization of the chapter.&lt;br /&gt;
&lt;br /&gt;
2. Best Project Leader  - active project leader to be recognized for the development of their project.&lt;br /&gt;
&lt;br /&gt;
3. Best Mission Outreach - individual who contributed to the growth of the organization through outreach to the community. &lt;br /&gt;
&lt;br /&gt;
4. Best New Community Supporter &amp;quot;Rookie of the Year&amp;quot; - individual (no requirement to be a leader) who has contributed to any chapter, project,  initiative, or other OWASP activity.&lt;br /&gt;
&lt;br /&gt;
5. Best Platform Supporter - (OWASP Staff Vote) individual who positively contributes to the reinforcement of the OWASP platform.&lt;br /&gt;
&lt;br /&gt;
=='''Rules:==&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote.&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until July 7, 2014&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated &lt;br /&gt;
&lt;br /&gt;
=='''Sponsorship Opportunities'''==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!  To learn more about how you can support these awards please see our [http://owasp.com/images/1/1a/2014_WASPY_Sponsorship_Doc.pdf '''Sponsorship Opportunities'''.]&lt;br /&gt;
&lt;br /&gt;
'''Become involved and support the WASPY Awards today!'''&lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sen Ueno]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;He is OWASP Japan Co-Chapter leader and leading OWASP AppSec APAC.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Riotaro Okada]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;The foundation of the OWASP Japan local chapter, its rapid growth to reaching over 2,000 participants in local chapter meetings in the first 2 years and the massive success of AppSec APAC 2014 in Tokyo would not have been possible without the passion and full commitment to the OWASP cause demonstrated by Rio.  He is definitely a role model for the OWASP community, especially in the Asia Pacific region which in general is lacking strong and effective leadership, and there is no doubt in my mind he is the most suited candidate for Best Chapter Leader based on the efforts he's contributed in the past few years as well as the success and results of those efforts.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He holds local chapter meeting(we call OWASP Night), and every event is full capacity and good topics. And he organized successful event, which is OWASP APAC 2014 in this year.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Rio has done an amazing job building up our Japan chapters. &lt;br /&gt;
Over the last few years with huge community meetings, new chapters in Japan and a lot of community activity. &lt;br /&gt;
This is truely outstanding!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Ron_Perris]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Orange County]||align=&amp;quot;center&amp;quot;|&amp;quot;Ron relaunched the OWASP Orange County Chapter. Grew the chapter leadership organization to five chapter leaders from three. Increased meeting frequency from bi-yearly to monthly. Held 13 meetings in the last twelve months. Attracted 140 new attendees to chapter meetings. Established a culture of vendor neutrality and speaker selection based on merit.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sebastien Deleersnyder]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Belgium]||align=&amp;quot;center&amp;quot;|&amp;quot;He does a lot of work, not only for the chapter meetings but also for the BeNeLux days. He is very approachable and open for suggestions.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;&amp;quot;I would like to nominate Jonathan for his involvement in:&lt;br /&gt;
1) Successfully leading the Montreal Chapter. Even when personally absent and traveling on another continent, Jonathan has remotely managed the overall execution of the local chapter meetings.&lt;br /&gt;
2) His valuable contribution to the OWASP Media project, that undoubtedly brings the &amp;quot;&amp;quot;O&amp;quot;&amp;quot; of OWASP to audiences unable to attend meetings&lt;br /&gt;
3) Jonathan has contributed and invested efforts on the &amp;quot;&amp;quot;outreach&amp;quot;&amp;quot; objective, announced by the board as a core objective for 2013-2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jeremy Long]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]||align=&amp;quot;center&amp;quot;|&amp;quot;Reasons Jeremy Long and his Dependency Check deserve a WASPY award:&lt;br /&gt;
&lt;br /&gt;
- His OWASP Dependency Check is a solution to the problem of third party libraries that needed to be solved. &lt;br /&gt;
- Jeremy's work on D.C. is steady.  He has put a lot of work into this project&lt;br /&gt;
- Jeremy has successfully involved others to help work on the project.  It is a model open source project.&lt;br /&gt;
- He has been responsive and helpful to questions and created a nice community of users.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Achim Hoffmann]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/O-Saft OWASP O-Saft]||align=&amp;quot;center&amp;quot;|&amp;quot;Achim is the project leader of O-Saft (https://www.owasp.org/index.php/O-Saft). O-Saft is a tool to analyze the SSL configuration of a web or mail server. It is a tool with a very specific focus, not a swiss army knife but there is a need for exactly this tool. Achim started the development at the beginning of the big SSL-crisis (concerns about weak ciphers, cipher orders, perfect forward secrecy, ). Without a specialized tool it is impossible to find out the SSL behaviour of a given server. Achim's interest was focused on facts only. The outcome of the tool is not a subjective rating, score or grade, only  facts about the config. Achim goals were exactness, comprehensiveness and impartiality which he achieved with his project. He was open to suggestions and could win additional highly motivated and skilled contributors. He is not a marketing driven project leader instead of that he gives talks and trainings about SSL and O-Saft (Munich Chapter, OWASP AppSec EU 2014 Cambridge) to share his knowledge.&lt;br /&gt;
 &lt;br /&gt;
I would like to nominate Achim for the OWASP Project Leader 2014 because his project fulfills the OWASP mission in a perfect way. It makes the security of SSL servers visible. There is no free avaiblabe tool beside O-Saft with a comparable comprehensive scope and ability to execute. It is completely free of commercial interests or commercial &amp;quot;&amp;quot;added values&amp;quot;&amp;quot;, distributed under a GPL.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Tokuji Akamine]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSecurity_Project  OWASP XSecurity Project]||align=&amp;quot;center&amp;quot;|&amp;quot;The idea(feature) of this security tool is excellent, especially these two points below.&lt;br /&gt;
Usually security is difficult and burdensome. But this security tool makes security much easier and less burdensome to iOS app developers.&lt;br /&gt;
1. Provide developer friendly security features on top of Xcode to assist developers to learn iOS app security.(Quick Security Help with built-in Security Guidelines)&lt;br /&gt;
2. Avoid making vulnerabilities during development.(Real-time Vulnerability Notifications)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He provides to assist iOS developers to develop secure iOS apps and  a security plugin for Xcode plus clang static analyzer checkers for iOS application development. This plugin will be to reduce the vulnerability made during development by detecting the vulnerability.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Matteo Meucci]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Matteo collaborates in OWASP from 2002.He founded the Italian Chapter in 2005.He candidates for the Autum of Code in 2006 to start a new project regarding the Testing Guide. He leads the OWASP Testing from 2006 (v2) to now with the publishing of Testing Guide v4 in the next weeks. He was capable to attract and manage more than 50 people to create the new Guide. Nowadays the Testing Guide is the most recognized project of OWASP with great contents and high quality delivery.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: John Melton]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_AppSensor OWASP AppSensor]||align=&amp;quot;center&amp;quot;|&amp;quot;John has working tirelessly, and mostly invisible behind the scenes in developing the OWASP AppSensor project. While others have lead the charge on the OWASP AppSensor documentation project, for the most part, John has been the sole contributor to the OWASP AppSensor source code.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Spyros Gasteratos]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Spyros has been involved in OWASP since 2010, contributing more and more time as years go by. He began by volunteering for OWASP AppSec Research 2012, where he was in charge for coordinating a team of more than 20 volunteers. For the past 1.5 year he as been co-leading the OWASP Hackademic Challenges Project. During that time he has managed to take the project into the next level both by producing code and by mentoring GSOC students. Spyros has spent a tremendous amount of time in coding, fixing bugs, setting up and maintaining a live version of Hackademic. Undoubtedly, without his efforts the project would have become dormant.Furthermore, he is also helping in other OWASP initiatives, e.g. by participating in the Open Source Showcase, presenting Hackademic and OWASP at the FOSDEM conference in Belgium and by setting up the new &amp;quot;&amp;quot;OWASP Code Wind&amp;quot;&amp;quot; project that aims to bring more student contributions to OWASP.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Mostafa Siraj]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Cairo Cairo Chapter]||align=&amp;quot;center&amp;quot;|&amp;quot;Mostafa did a great job helping our chapter (Cairo Chapter), here are summary of his contribution: - He had a great talk in the latest chapter event, he talk about AppSec US summarizing the conference technical sessions (Mostafa attended the 2013 conference and won the technical competition there), - Mostafa is one of the main members of a small group of AppSec expertise from Cairo chapter, this group is engaged now for preparing security awareness training program for all governmental developers in Egypt, I highly recommend him,&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Category:OWASP_Video OWASP Videos]||align=&amp;quot;center&amp;quot;|&amp;quot;Because he is helping spread OWASP message through this videos and live streaming events&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSecUSA2013 Team]||align=&amp;quot;center&amp;quot;|[http://2013.appsecusa.org/ AppSecUSA 2013 Team]||align=&amp;quot;center&amp;quot;|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best New Community Supporter&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSec APAC 2014 Team]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014]||align=&amp;quot;center&amp;quot;|&amp;quot;Despite it being the first time that AppSec was held in Japan and despite the lack of experience in planning and organizing a large scale international conference, the volunteers on the AppSec APAC 2014 team came together and went above and beyond their responsibilities to make AppSec APAC 2014 in Tokyo a stunning success.  It was by far the most successful AppSec in the Asia Pacific region and achieved an unprecedented level of profitability.  The vast majority of the sponsors were Japanese companies and many of the attendees were Japanese.  The ability to achieve this despite the relatively low level of awareness of the OWASP brand in Japan was definitely due to the hard work and dedication of the AppSec APAC 2014 team who worked around the clock to make the event a success.  Considering that there were no applicants to hold AppSec APAC 2015 despite the tremendous success in Tokyo, recognizing the contributions of the AppSec APAC 2015 team would definitely give a strong message motivating the Asia Pacific community and facilitate future OWASP initiatives in the region.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Robert Dracea]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=WELCOME AppSec Asia Pac 2014] [https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been excellent, since we have started preparation for the Global AppSec APAC2014. Based on his passion to promote valuable information regards to information security in Japan, he contributed his bilingual ability to prepare and preside AppSec APAC in Tokyo.  He committed the local committee by attended every weekly meeting for more than 9 months from his office and his home. Surely, thanks to his help, potential language barrier were completely broken in  the conference. This experience of us will be a good example for OWASP organizers especially in Asia Pacific area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Takanori Nakanowatari]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014][https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been awesome, since we have started preparation for the Global AppSec APAC2014. His experience which attended a few AppSecs were very helpful to organize the newly AppSec in Tokyo, and he committee the local committee by attended every weekly meeting for more than 9 months from his office and his home. Moreover, thanks to his advice, 2 OWASP ZAP evangelists were born in Japan at the timing of AppSec APAC 2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Beth Guth]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/New_Jersey_South South New Jersey]||align=&amp;quot;center&amp;quot;|&amp;quot;She started South New Jersey chapter with energy and enthusiasm bringing together people from builders, breakers and defenders. Self-starter&amp;quot;&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178319</id>
		<title>User:Ron Perris</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Ron_Perris&amp;diff=178319"/>
				<updated>2014-07-09T00:01:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Involvement in OWASP ==&lt;br /&gt;
&lt;br /&gt;
* Relaunched the OWASP Orange County Chapter.&lt;br /&gt;
** Grew the chapter leadership organization to five chapter leaders from three. &lt;br /&gt;
** Increased meeting frequency from bi-yearly to monthly. &lt;br /&gt;
** Held 13 meetings in the last twelve months. &lt;br /&gt;
** Attracted 140 new attendees to chapter meetings. &lt;br /&gt;
** Established a culture of vendor neutrality and speakers selection based on merit&lt;br /&gt;
&lt;br /&gt;
* Helped Organize [https://2014.appseccalifornia.org/ AppSecCalifornia 2013] along with OWASP OC Organizers and other California OWASP Chapters&lt;br /&gt;
** Attracted Speakers to Call-for-Papers&lt;br /&gt;
** Worked with OWASP team to Setup Vendor Room&lt;br /&gt;
** Performed Registration and Information Desk Duty&lt;br /&gt;
&lt;br /&gt;
== Current Projects ==&lt;br /&gt;
* OWASP Secure Coding for Charity Project in Orange County&lt;br /&gt;
* OWASP Orange County Capture the Flag Challenge&lt;br /&gt;
&lt;br /&gt;
== Contact Info ==&lt;br /&gt;
* Email: ron.perris@owasp.org&lt;br /&gt;
* [http://www.meetup.com/OWASP-OC/ OWASP OC Meetings]&lt;br /&gt;
* [https://www.linkedin.com/in/ronperris Linkedin]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178105</id>
		<title>WASPY Awards 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178105"/>
				<updated>2014-07-07T16:20:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER-2014.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2014'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Timeline'''==&lt;br /&gt;
&lt;br /&gt;
June 10 - Call for Nominees '''Now Open!''' Submit your nominee [http://www.tfaforms.com/284578 here]&lt;br /&gt;
&lt;br /&gt;
June 23 - Reminder Email Will be Sent For Call for Nominees&lt;br /&gt;
&lt;br /&gt;
June 30 - Call for Nominees Closes&lt;br /&gt;
&lt;br /&gt;
July 7 - Announcement of Nominees Per Category&lt;br /&gt;
&lt;br /&gt;
July 15 - Deadline For Profile Picture and Bio to be Submitted&lt;br /&gt;
&lt;br /&gt;
July 31 - Paid Membership Deadline - '''NOT SURE IF YOU ARE A CURRENT MEMBER?''' &lt;br /&gt;
&lt;br /&gt;
August 8 - Voting Opens&lt;br /&gt;
&lt;br /&gt;
August 26 - Voting Closes&lt;br /&gt;
&lt;br /&gt;
August 27 - Announcement of Winners&lt;br /&gt;
&lt;br /&gt;
September 16-19 - Awards Ceremony at AppSecUSA 2014 in Denver, CO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Categories'''==&lt;br /&gt;
&lt;br /&gt;
1. Best Chapter Leader - active chapter leader to be recognized for their contributions to the growth and organization of the chapter.&lt;br /&gt;
&lt;br /&gt;
2. Best Project Leader  - active project leader to be recognized for the development of their project.&lt;br /&gt;
&lt;br /&gt;
3. Best Mission Outreach - individual who contributed to the growth of the organization through outreach to the community. &lt;br /&gt;
&lt;br /&gt;
4. Best New Community Supporter &amp;quot;Rookie of the Year&amp;quot; - individual (no requirement to be a leader) who has contributed to any chapter, project,  initiative, or other OWASP activity.&lt;br /&gt;
&lt;br /&gt;
5. Best Platform Supporter - (OWASP Staff Vote) individual who positively contributes to the reinforcement of the OWASP platform.&lt;br /&gt;
&lt;br /&gt;
=='''Rules:==&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote.&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until July 7, 2014&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated &lt;br /&gt;
&lt;br /&gt;
=='''Sponsorship Opportunities'''==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!  To learn more about how you can support these awards please see our [http://owasp.com/images/1/1a/2014_WASPY_Sponsorship_Doc.pdf '''Sponsorship Opportunities'''.]&lt;br /&gt;
&lt;br /&gt;
'''Become involved and support the WASPY Awards today!'''&lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sen Ueno]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;He is OWASP Japan Co-Chapter leader and leading OWASP AppSec APAC.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Brennan Tom Brennan]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ New York City]||align=&amp;quot;center&amp;quot;|&amp;quot;Tom Brennan has consistently invested the time and effort into making the NYC chapter one of the best organizations to which I belong.  Due to Tom's hard work there are regular chapter meetings with great speakers from whom to learn cutting edge techniques, free food, non-pushy sponsors, and networking opportunities.  His passion for the industry, desire to make a difference, and inclusiveness comes through when you hear him speak at any chapter event.  When I speak with colleagues in other OWASP chapters and other organizations (ISSA, ISACA, Infragard, Secret Service Electronic Crimes Task Force, etc.), they are amazed at the quantity and quality of OWASP NYC chapter events.  This is why I think Tom Brennan deserves to be recognized as the Best Chapter Leader.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Riotaro Okada]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;The foundation of the OWASP Japan local chapter, its rapid growth to reaching over 2,000 participants in local chapter meetings in the first 2 years and the massive success of AppSec APAC 2014 in Tokyo would not have been possible without the passion and full commitment to the OWASP cause demonstrated by Rio.  He is definitely a role model for the OWASP community, especially in the Asia Pacific region which in general is lacking strong and effective leadership, and there is no doubt in my mind he is the most suited candidate for Best Chapter Leader based on the efforts he's contributed in the past few years as well as the success and results of those efforts.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He holds local chapter meeting(we call OWASP Night), and every event is full capacity and good topics. And he organized successful event, which is OWASP APAC 2014 in this year.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Rio has done an amazing job building up our Japan chapters. &lt;br /&gt;
Over the last few years with huge community meetings, new chapters in Japan and a lot of community activity. &lt;br /&gt;
This is truely outstanding!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Ron Perris]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Orange County]||align=&amp;quot;center&amp;quot;|&amp;quot;Ron relaunched the OWASP Orange County Chapter. Grew the chapter leadership organization to five chapter leaders from three. Increased meeting frequency from bi-yearly to monthly. Held 13 meetings in the last twelve months. Attracted 140 new attendees to chapter meetings. Established a culture of vendor neutrality and speaker selection based on merit.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sebastien Deleersnyder]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Belgium]||align=&amp;quot;center&amp;quot;|&amp;quot;He does a lot of work, not only for the chapter meetings but also for the BeNeLux days. He is very approachable and open for suggestions.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;&amp;quot;I would like to nominate Jonathan for his involvement in:&lt;br /&gt;
1) Successfully leading the Montreal Chapter. Even when personally absent and traveling on another continent, Jonathan has remotely managed the overall execution of the local chapter meetings.&lt;br /&gt;
2) His valuable contribution to the OWASP Media project, that undoubtedly brings the &amp;quot;&amp;quot;O&amp;quot;&amp;quot; of OWASP to audiences unable to attend meetings&lt;br /&gt;
3) Jonathan has contributed and invested efforts on the &amp;quot;&amp;quot;outreach&amp;quot;&amp;quot; objective, announced by the board as a core objective for 2013-2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jeremy Long]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]||align=&amp;quot;center&amp;quot;|&amp;quot;Reasons Jeremy Long and his Dependency Check deserve a WASPY award:&lt;br /&gt;
&lt;br /&gt;
- His OWASP Dependency Check is a solution to the problem of third party libraries that needed to be solved. &lt;br /&gt;
- Jeremy's work on D.C. is steady.  He has put a lot of work into this project&lt;br /&gt;
- Jeremy has successfully involved others to help work on the project.  It is a model open source project.&lt;br /&gt;
- He has been responsive and helpful to questions and created a nice community of users.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Achim Hoffmann]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/O-Saft OWASP O-Saft]||align=&amp;quot;center&amp;quot;|&amp;quot;Achim is the project leader of O-Saft (https://www.owasp.org/index.php/O-Saft). O-Saft is a tool to analyze the SSL configuration of a web or mail server. It is a tool with a very specific focus, not a swiss army knife but there is a need for exactly this tool. Achim started the development at the beginning of the big SSL-crisis (concerns about weak ciphers, cipher orders, perfect forward secrecy, ). Without a specialized tool it is impossible to find out the SSL behaviour of a given server. Achim's interest was focused on facts only. The outcome of the tool is not a subjective rating, score or grade, only  facts about the config. Achim goals were exactness, comprehensiveness and impartiality which he achieved with his project. He was open to suggestions and could win additional highly motivated and skilled contributors. He is not a marketing driven project leader instead of that he gives talks and trainings about SSL and O-Saft (Munich Chapter, OWASP AppSec EU 2014 Cambridge) to share his knowledge.&lt;br /&gt;
 &lt;br /&gt;
I would like to nominate Achim for the OWASP Project Leader 2014 because his project fulfills the OWASP mission in a perfect way. It makes the security of SSL servers visible. There is no free avaiblabe tool beside O-Saft with a comparable comprehensive scope and ability to execute. It is completely free of commercial interests or commercial &amp;quot;&amp;quot;added values&amp;quot;&amp;quot;, distributed under a GPL.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Tokuji Akamine]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSecurity_Project  OWASP XSecurity Project]||align=&amp;quot;center&amp;quot;|&amp;quot;The idea(feature) of this security tool is excellent, especially these two points below.&lt;br /&gt;
Usually security is difficult and burdensome. But this security tool makes security much easier and less burdensome to iOS app developers.&lt;br /&gt;
1. Provide developer friendly security features on top of Xcode to assist developers to learn iOS app security.(Quick Security Help with built-in Security Guidelines)&lt;br /&gt;
2. Avoid making vulnerabilities during development.(Real-time Vulnerability Notifications)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He provides to assist iOS developers to develop secure iOS apps and  a security plugin for Xcode plus clang static analyzer checkers for iOS application development. This plugin will be to reduce the vulnerability made during development by detecting the vulnerability.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Matteo Meucci]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Matteo collaborates in OWASP from 2002.He founded the Italian Chapter in 2005.He candidates for the Autum of Code in 2006 to start a new project regarding the Testing Guide. He leads the OWASP Testing from 2006 (v2) to now with the publishing of Testing Guide v4 in the next weeks. He was capable to attract and manage more than 50 people to create the new Guide. Nowadays the Testing Guide is the most recognized project of OWASP with great contents and high quality delivery.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: John Melton]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_AppSensor OWASP AppSensor]||align=&amp;quot;center&amp;quot;|&amp;quot;John has working tirelessly, and mostly invisible behind the scenes in developing the OWASP AppSensor project. While others have lead the charge on the OWASP AppSensor documentation project, for the most part, John has been the sole contributor to the OWASP AppSensor source code.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Spyros Gasteratos]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Spyros has been involved in OWASP since 2010, contributing more and more time as years go by. He began by volunteering for OWASP AppSec Research 2012, where he was in charge for coordinating a team of more than 20 volunteers. For the past 1.5 year he as been co-leading the OWASP Hackademic Challenges Project. During that time he has managed to take the project into the next level both by producing code and by mentoring GSOC students. Spyros has spent a tremendous amount of time in coding, fixing bugs, setting up and maintaining a live version of Hackademic. Undoubtedly, without his efforts the project would have become dormant.Furthermore, he is also helping in other OWASP initiatives, e.g. by participating in the Open Source Showcase, presenting Hackademic and OWASP at the FOSDEM conference in Belgium and by setting up the new &amp;quot;&amp;quot;OWASP Code Wind&amp;quot;&amp;quot; project that aims to bring more student contributions to OWASP.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Brennan Tom Brennan]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/NYC New York City][https://www.owasp.org/index.php/AppSecUSA_2013 AppSecUSA 2013]||align=&amp;quot;center&amp;quot;|&amp;quot;Tom has worked very hard and exceptionally successful on bring OWASP to the community in his role as chapter lead for NYC and running the biggest and most successful AppSecUS in all times. With exceptionally strong local chapter meetings in NY area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Mostafa Siraj]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Cairo Cairo Chapter]||align=&amp;quot;center&amp;quot;|&amp;quot;Mostafa did a great job helping our chapter (Cairo Chapter), here are summary of his contribution: - He had a great talk in the latest chapter event, he talk about AppSec US summarizing the conference technical sessions (Mostafa attended the 2013 conference and won the technical competition there), - Mostafa is one of the main members of a small group of AppSec expertise from Cairo chapter, this group is engaged now for preparing security awareness training program for all governmental developers in Egypt, I highly recommend him,&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Category:OWASP_Video OWASP Videos]||align=&amp;quot;center&amp;quot;|&amp;quot;Because he is helping spread OWASP message through this videos and live streaming events&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Eoin Keary]||align=&amp;quot;center&amp;quot;|[http://owasp.com/index.php/Projects_Reboot_2012 Project 2012 Reboot]||align=&amp;quot;center&amp;quot;|&amp;quot;Eoin has had a busy year: Said NO to RSA and took a stand against erosion of software security. Donated training to OWASP and delivered training to 100's of people. Raised funds via Project Reboot to help many projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best New Community Supporter&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSec APAC 2014 Team]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014]||align=&amp;quot;center&amp;quot;|&amp;quot;Despite it being the first time that AppSec was held in Japan and despite the lack of experience in planning and organizing a large scale international conference, the volunteers on the AppSec APAC 2014 team came together and went above and beyond their responsibilities to make AppSec APAC 2014 in Tokyo a stunning success.  It was by far the most successful AppSec in the Asia Pacific region and achieved an unprecedented level of profitability.  The vast majority of the sponsors were Japanese companies and many of the attendees were Japanese.  The ability to achieve this despite the relatively low level of awareness of the OWASP brand in Japan was definitely due to the hard work and dedication of the AppSec APAC 2014 team who worked around the clock to make the event a success.  Considering that there were no applicants to hold AppSec APAC 2015 despite the tremendous success in Tokyo, recognizing the contributions of the AppSec APAC 2015 team would definitely give a strong message motivating the Asia Pacific community and facilitate future OWASP initiatives in the region.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Robert Dracea]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=WELCOME AppSec Asia Pac 2014] [https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been excellent, since we have started preparation for the Global AppSec APAC2014. Based on his passion to promote valuable information regards to information security in Japan, he contributed his bilingual ability to prepare and preside AppSec APAC in Tokyo.  He committed the local committee by attended every weekly meeting for more than 9 months from his office and his home. Surely, thanks to his help, potential language barrier were completely broken in  the conference. This experience of us will be a good example for OWASP organizers especially in Asia Pacific area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Takanori Nakanowatari]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014][https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been awesome, since we have started preparation for the Global AppSec APAC2014. His experience which attended a few AppSecs were very helpful to organize the newly AppSec in Tokyo, and he committee the local committee by attended every weekly meeting for more than 9 months from his office and his home. Moreover, thanks to his advice, 2 OWASP ZAP evangelists were born in Japan at the timing of AppSec APAC 2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Beth Guth]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/New_Jersey_South South New Jersey]||align=&amp;quot;center&amp;quot;|&amp;quot;She started South New Jersey chapter with energy and enthusiasm bringing together people from builders, breakers and defenders. Self-starter&amp;quot;&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178104</id>
		<title>WASPY Awards 2014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2014&amp;diff=178104"/>
				<updated>2014-07-07T16:18:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: Fixed typo and updated Citation.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY-BANNER-2014.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font size=&amp;quot;6&amp;quot;&amp;gt;'''Web Application Security People of the Year Awards 2014'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Every year a group of individuals including researchers, developers, security professionals and others work to ensure the security of web applications. Some of these individuals are featured in news stories or at conferences as recognized experts. But there are many other ‘unsung heroes’ that work every day to improve web application security and yet are rarely recognized. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Timeline'''==&lt;br /&gt;
&lt;br /&gt;
June 10 - Call for Nominees '''Now Open!''' Submit your nominee [http://www.tfaforms.com/284578 here]&lt;br /&gt;
&lt;br /&gt;
June 23 - Reminder Email Will be Sent For Call for Nominees&lt;br /&gt;
&lt;br /&gt;
June 30 - Call for Nominees Closes&lt;br /&gt;
&lt;br /&gt;
July 7 - Announcement of Nominees Per Category&lt;br /&gt;
&lt;br /&gt;
July 15 - Deadline For Profile Picture and Bio to be Submitted&lt;br /&gt;
&lt;br /&gt;
July 31 - Paid Membership Deadline - '''NOT SURE IF YOU ARE A CURRENT MEMBER?''' &lt;br /&gt;
&lt;br /&gt;
August 8 - Voting Opens&lt;br /&gt;
&lt;br /&gt;
August 26 - Voting Closes&lt;br /&gt;
&lt;br /&gt;
August 27 - Announcement of Winners&lt;br /&gt;
&lt;br /&gt;
September 16-19 - Awards Ceremony at AppSecUSA 2014 in Denver, CO&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''Categories'''==&lt;br /&gt;
&lt;br /&gt;
1. Best Chapter Leader - active chapter leader to be recognized for their contributions to the growth and organization of the chapter.&lt;br /&gt;
&lt;br /&gt;
2. Best Project Leader  - active project leader to be recognized for the development of their project.&lt;br /&gt;
&lt;br /&gt;
3. Best Mission Outreach - individual who contributed to the growth of the organization through outreach to the community. &lt;br /&gt;
&lt;br /&gt;
4. Best New Community Supporter &amp;quot;Rookie of the Year&amp;quot; - individual (no requirement to be a leader) who has contributed to any chapter, project,  initiative, or other OWASP activity.&lt;br /&gt;
&lt;br /&gt;
5. Best Platform Supporter - (OWASP Staff Vote) individual who positively contributes to the reinforcement of the OWASP platform.&lt;br /&gt;
&lt;br /&gt;
=='''Rules:==&lt;br /&gt;
&lt;br /&gt;
1. Board members can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
2. Paid staff can NOT be nominated&lt;br /&gt;
&lt;br /&gt;
3. Must be a paid member to vote.&lt;br /&gt;
&lt;br /&gt;
4. All nominees will remain anonymous until July 7, 2014&lt;br /&gt;
&lt;br /&gt;
5. Anyone can nominate any individual&lt;br /&gt;
&lt;br /&gt;
6. One person per category may be nominated &lt;br /&gt;
&lt;br /&gt;
=='''Sponsorship Opportunities'''==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!  To learn more about how you can support these awards please see our [http://owasp.com/images/1/1a/2014_WASPY_Sponsorship_Doc.pdf '''Sponsorship Opportunities'''.]&lt;br /&gt;
&lt;br /&gt;
'''Become involved and support the WASPY Awards today!'''&lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
'''Categories:'''&lt;br /&gt;
&lt;br /&gt;
*Best Chapter Leader&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Chapter &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sen Ueno]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;He is OWASP Japan Co-Chapter leader and leading OWASP AppSec APAC.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User:Brennan Tom Brennan]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ New York City]||align=&amp;quot;center&amp;quot;|&amp;quot;Tom Brennan has consistently invested the time and effort into making the NYC chapter one of the best organizations to which I belong.  Due to Tom's hard work there are regular chapter meetings with great speakers from whom to learn cutting edge techniques, free food, non-pushy sponsors, and networking opportunities.  His passion for the industry, desire to make a difference, and inclusiveness comes through when you hear him speak at any chapter event.  When I speak with colleagues in other OWASP chapters and other organizations (ISSA, ISACA, Infragard, Secret Service Electronic Crimes Task Force, etc.), they are amazed at the quantity and quality of OWASP NYC chapter events.  This is why I think Tom Brennan deserves to be recognized as the Best Chapter Leader.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Riotaro Okada]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;The foundation of the OWASP Japan local chapter, its rapid growth to reaching over 2,000 participants in local chapter meetings in the first 2 years and the massive success of AppSec APAC 2014 in Tokyo would not have been possible without the passion and full commitment to the OWASP cause demonstrated by Rio.  He is definitely a role model for the OWASP community, especially in the Asia Pacific region which in general is lacking strong and effective leadership, and there is no doubt in my mind he is the most suited candidate for Best Chapter Leader based on the efforts he's contributed in the past few years as well as the success and results of those efforts.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He holds local chapter meeting(we call OWASP Night), and every event is full capacity and good topics. And he organized successful event, which is OWASP APAC 2014 in this year.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Rio has done an amazing job building up our Japan chapters. &lt;br /&gt;
Over the last few years with huge community meetings, new chapters in Japan and a lot of community activity. &lt;br /&gt;
This is truely outstanding!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Ron Perris]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Orange County]||align=&amp;quot;center&amp;quot;|&amp;quot;Ron relaunched the OWASP Orange County Chapter. Grew the chapter leadership organization to five chapter leaders from three. Increased meeting frequency from bi-yearly to monthly. Held 13 meetings in the last twelve months. Attracted 140 new attendees to chapter meetings. Established a culture of vendor neutrality and speakers selection based on merit.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Sebastien Deleersnyder]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Belgium]||align=&amp;quot;center&amp;quot;|&amp;quot;He does a lot of work, not only for the chapter meetings but also for the BeNeLux days. He is very approachable and open for suggestions.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;| [https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/ Montreal]||align=&amp;quot;center&amp;quot;|&amp;quot;&amp;quot;I would like to nominate Jonathan for his involvement in:&lt;br /&gt;
1) Successfully leading the Montreal Chapter. Even when personally absent and traveling on another continent, Jonathan has remotely managed the overall execution of the local chapter meetings.&lt;br /&gt;
2) His valuable contribution to the OWASP Media project, that undoubtedly brings the &amp;quot;&amp;quot;O&amp;quot;&amp;quot; of OWASP to audiences unable to attend meetings&lt;br /&gt;
3) Jonathan has contributed and invested efforts on the &amp;quot;&amp;quot;outreach&amp;quot;&amp;quot; objective, announced by the board as a core objective for 2013-2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Project Leader&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; | Project &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jeremy Long]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Dependency_Check OWASP Dependency Check]||align=&amp;quot;center&amp;quot;|&amp;quot;Reasons Jeremy Long and his Dependency Check deserve a WASPY award:&lt;br /&gt;
&lt;br /&gt;
- His OWASP Dependency Check is a solution to the problem of third party libraries that needed to be solved. &lt;br /&gt;
- Jeremy's work on D.C. is steady.  He has put a lot of work into this project&lt;br /&gt;
- Jeremy has successfully involved others to help work on the project.  It is a model open source project.&lt;br /&gt;
- He has been responsive and helpful to questions and created a nice community of users.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Achim Hoffmann]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/O-Saft OWASP O-Saft]||align=&amp;quot;center&amp;quot;|&amp;quot;Achim is the project leader of O-Saft (https://www.owasp.org/index.php/O-Saft). O-Saft is a tool to analyze the SSL configuration of a web or mail server. It is a tool with a very specific focus, not a swiss army knife but there is a need for exactly this tool. Achim started the development at the beginning of the big SSL-crisis (concerns about weak ciphers, cipher orders, perfect forward secrecy, ). Without a specialized tool it is impossible to find out the SSL behaviour of a given server. Achim's interest was focused on facts only. The outcome of the tool is not a subjective rating, score or grade, only  facts about the config. Achim goals were exactness, comprehensiveness and impartiality which he achieved with his project. He was open to suggestions and could win additional highly motivated and skilled contributors. He is not a marketing driven project leader instead of that he gives talks and trainings about SSL and O-Saft (Munich Chapter, OWASP AppSec EU 2014 Cambridge) to share his knowledge.&lt;br /&gt;
 &lt;br /&gt;
I would like to nominate Achim for the OWASP Project Leader 2014 because his project fulfills the OWASP mission in a perfect way. It makes the security of SSL servers visible. There is no free avaiblabe tool beside O-Saft with a comparable comprehensive scope and ability to execute. It is completely free of commercial interests or commercial &amp;quot;&amp;quot;added values&amp;quot;&amp;quot;, distributed under a GPL.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Tokuji Akamine]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_XSecurity_Project  OWASP XSecurity Project]||align=&amp;quot;center&amp;quot;|&amp;quot;The idea(feature) of this security tool is excellent, especially these two points below.&lt;br /&gt;
Usually security is difficult and burdensome. But this security tool makes security much easier and less burdensome to iOS app developers.&lt;br /&gt;
1. Provide developer friendly security features on top of Xcode to assist developers to learn iOS app security.(Quick Security Help with built-in Security Guidelines)&lt;br /&gt;
2. Avoid making vulnerabilities during development.(Real-time Vulnerability Notifications)&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;He provides to assist iOS developers to develop secure iOS apps and  a security plugin for Xcode plus clang static analyzer checkers for iOS application development. This plugin will be to reduce the vulnerability made during development by detecting the vulnerability.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Matteo Meucci]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Testing_Project OWASP Testing Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Matteo collaborates in OWASP from 2002.He founded the Italian Chapter in 2005.He candidates for the Autum of Code in 2006 to start a new project regarding the Testing Guide. He leads the OWASP Testing from 2006 (v2) to now with the publishing of Testing Guide v4 in the next weeks. He was capable to attract and manage more than 50 people to create the new Guide. Nowadays the Testing Guide is the most recognized project of OWASP with great contents and high quality delivery.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: John Melton]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_AppSensor OWASP AppSensor]||align=&amp;quot;center&amp;quot;|&amp;quot;John has working tirelessly, and mostly invisible behind the scenes in developing the OWASP AppSensor project. While others have lead the charge on the OWASP AppSensor documentation project, for the most part, John has been the sole contributor to the OWASP AppSensor source code.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Spyros Gasteratos]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project OWASP Hackademic Challenges Project]||align=&amp;quot;center&amp;quot;|&amp;quot;Spyros has been involved in OWASP since 2010, contributing more and more time as years go by. He began by volunteering for OWASP AppSec Research 2012, where he was in charge for coordinating a team of more than 20 volunteers. For the past 1.5 year he as been co-leading the OWASP Hackademic Challenges Project. During that time he has managed to take the project into the next level both by producing code and by mentoring GSOC students. Spyros has spent a tremendous amount of time in coding, fixing bugs, setting up and maintaining a live version of Hackademic. Undoubtedly, without his efforts the project would have become dormant.Furthermore, he is also helping in other OWASP initiatives, e.g. by participating in the Open Source Showcase, presenting Hackademic and OWASP at the FOSDEM conference in Belgium and by setting up the new &amp;quot;&amp;quot;OWASP Code Wind&amp;quot;&amp;quot; project that aims to bring more student contributions to OWASP.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best Mission Outreach&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User:Brennan Tom Brennan]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/NYC New York City][https://www.owasp.org/index.php/AppSecUSA_2013 AppSecUSA 2013]||align=&amp;quot;center&amp;quot;|&amp;quot;Tom has worked very hard and exceptionally successful on bring OWASP to the community in his role as chapter lead for NYC and running the biggest and most successful AppSecUS in all times. With exceptionally strong local chapter meetings in NY area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Mostafa Siraj]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Cairo Cairo Chapter]||align=&amp;quot;center&amp;quot;|&amp;quot;Mostafa did a great job helping our chapter (Cairo Chapter), here are summary of his contribution: - He had a great talk in the latest chapter event, he talk about AppSec US summarizing the conference technical sessions (Mostafa attended the 2013 conference and won the technical competition there), - Mostafa is one of the main members of a small group of AppSec expertise from Cairo chapter, this group is engaged now for preparing security awareness training program for all governmental developers in Egypt, I highly recommend him,&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Jonathan Marcil]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/Category:OWASP_Video OWASP Videos]||align=&amp;quot;center&amp;quot;|&amp;quot;Because he is helping spread OWASP message through this videos and live streaming events&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Eoin Keary]||align=&amp;quot;center&amp;quot;|[http://owasp.com/index.php/Projects_Reboot_2012 Project 2012 Reboot]||align=&amp;quot;center&amp;quot;|&amp;quot;Eoin has had a busy year: Said NO to RSA and took a stand against erosion of software security. Donated training to OWASP and delivered training to 100's of people. Raised funds via Project Reboot to help many projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
*Best New Community Supporter&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;150&amp;quot; | Name&lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;120&amp;quot; |  &lt;br /&gt;
! scope=&amp;quot;col&amp;quot; align=&amp;quot;center&amp;quot; width=&amp;quot;800&amp;quot; | Citation&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: AppSec APAC 2014 Team]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014]||align=&amp;quot;center&amp;quot;|&amp;quot;Despite it being the first time that AppSec was held in Japan and despite the lack of experience in planning and organizing a large scale international conference, the volunteers on the AppSec APAC 2014 team came together and went above and beyond their responsibilities to make AppSec APAC 2014 in Tokyo a stunning success.  It was by far the most successful AppSec in the Asia Pacific region and achieved an unprecedented level of profitability.  The vast majority of the sponsors were Japanese companies and many of the attendees were Japanese.  The ability to achieve this despite the relatively low level of awareness of the OWASP brand in Japan was definitely due to the hard work and dedication of the AppSec APAC 2014 team who worked around the clock to make the event a success.  Considering that there were no applicants to hold AppSec APAC 2015 despite the tremendous success in Tokyo, recognizing the contributions of the AppSec APAC 2015 team would definitely give a strong message motivating the Asia Pacific community and facilitate future OWASP initiatives in the region.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Robert Dracea]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=WELCOME AppSec Asia Pac 2014] [https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been excellent, since we have started preparation for the Global AppSec APAC2014. Based on his passion to promote valuable information regards to information security in Japan, he contributed his bilingual ability to prepare and preside AppSec APAC in Tokyo.  He committed the local committee by attended every weekly meeting for more than 9 months from his office and his home. Surely, thanks to his help, potential language barrier were completely broken in  the conference. This experience of us will be a good example for OWASP organizers especially in Asia Pacific area.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Takanori Nakanowatari]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/AppSecAsiaPac2014#tab=TEAM AppSec Asia Pac 2014][https://www.owasp.org/index.php/Japan Japan]||align=&amp;quot;center&amp;quot;|&amp;quot;His contribution has been awesome, since we have started preparation for the Global AppSec APAC2014. His experience which attended a few AppSecs were very helpful to organize the newly AppSec in Tokyo, and he committee the local committee by attended every weekly meeting for more than 9 months from his office and his home. Moreover, thanks to his advice, 2 OWASP ZAP evangelists were born in Japan at the timing of AppSec APAC 2014.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/User: Beth Guth]||align=&amp;quot;center&amp;quot;|[https://www.owasp.org/index.php/New_Jersey_South South New Jersey]||align=&amp;quot;center&amp;quot;|&amp;quot;She started South New Jersey chapter with energy and enthusiasm bringing together people from builders, breakers and defenders. Self-starter&amp;quot;&lt;br /&gt;
|-&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=169477</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=169477"/>
				<updated>2014-03-05T04:46:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
Meeting information can be found at the link below.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
THIS PAGE IS NO LONGER UPDATED. &lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history. '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
 '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164837</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164837"/>
				<updated>2013-12-17T21:22:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
Meeting information can be found at the link below.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
THIS PAGE IS NO LONGER UPDATED. &lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history. '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164836</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164836"/>
				<updated>2013-12-17T21:20:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
Meeting information can be found at the link below.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
THIS PAGE IS NO LONGER UPDATED. &lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history. '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164835</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164835"/>
				<updated>2013-12-17T21:20:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
Meeting information can be found at the link below.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
THIS PAGE IS NO LONGER UPDATED. &lt;br /&gt;
&lt;br /&gt;
Check out our meetup.com page for recent chapter history. '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164834</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=164834"/>
				<updated>2013-12-17T21:18:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
Meeting information can be found at the link below.&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160870</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160870"/>
				<updated>2013-10-15T17:43:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Organization =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160869</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160869"/>
				<updated>2013-10-15T17:42:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Chapter Leader&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:adam.brand@protiviti.com Adam Brand]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Co-organizer and Board Member&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160867</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=160867"/>
				<updated>2013-10-15T17:10:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== September 17th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=159996</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=159996"/>
				<updated>2013-10-08T21:51:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156904</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156904"/>
				<updated>2013-08-16T16:44:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Do VLANs allow for good application security?'''&lt;br /&gt;
 &lt;br /&gt;
'''Presenter: David M. N. Bryan'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''' &lt;br /&gt;
&lt;br /&gt;
7:30 - &lt;br /&gt;
&lt;br /&gt;
'''Where:''' We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Michael Sutton &lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:30 PM - &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156903</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156903"/>
				<updated>2013-08-16T16:38:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
RSVP: [https://www.regonline.com/owasp_oc_jan Here]&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156902</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156902"/>
				<updated>2013-08-16T16:37:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Topic: Threat Modeling at Symantec'''&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Edward Bonver'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
'''Schedule:''&lt;br /&gt;
&lt;br /&gt;
1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
5151 California Ave&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156900</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156900"/>
				<updated>2013-08-16T16:32:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
'''Speaker Bio:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Online Privacy and the Evercookie'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Samy Kamkar''' &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Samy Kamkar has lectured on computer security issues in over a dozen countries, and his work has been featured on the front page of the New York Times. As a grey-hat hacker, he makes and breaks computer security for tech companies. In addition to his independent security research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Topic: Back to Basics, Defensive Coding Principles for Web Development 101'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The application security community is in deep need of prescriptive solutions for developers. This talk will review the world of Web Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on critical controls that all developers must master if they wish to build low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio:''' Jim Manico is the chair of the OWASP Connections committee where he focuses on producing and hosting the OWASP Podcast. Jim also is a co-manager of the OWASP ESAPI Open Source project. Professionally, Jim is an independent application security architect specializing in the construction of low-risk web applications. Jim is also an application security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156899</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156899"/>
				<updated>2013-08-16T16:20:17Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman, a Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
Topic: Friendly_id + ancestry'&lt;br /&gt;
&lt;br /&gt;
Presenter: Neil Matatall&lt;br /&gt;
&lt;br /&gt;
Topic: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
Presenter: Drew Deponte&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Irvine&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Global Security Report 2011'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Charles Henderson'''&lt;br /&gt;
&lt;br /&gt;
''Summary:''' Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security. The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' HireRight Offices&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' [http://owaspoc.eventbrite.com/ Here]&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.'''&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
'''Speaker:''' Charles Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services. Prior to joining SpiderLabs, Henderson ran his own boutique application security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe. Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156898</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156898"/>
				<updated>2013-08-16T16:11:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Brakeman: Ruby on Rails Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
'''Presenter: Brakeman with Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' While the popular Ruby on Rails web framework provides built-in protection for many security vulnerabilities, it is still possible to misuse these features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
'''Lightning Talks:'''&lt;br /&gt;
&lt;br /&gt;
'''Topic: Friendly_id + ancestry'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall'''&lt;br /&gt;
&lt;br /&gt;
'''Topic: Guard, spork, BDD'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Drew Deponte'''&lt;br /&gt;
&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156897</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156897"/>
				<updated>2013-08-16T16:00:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions &lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Jerry Hoff'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Jerry Hoff will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
'''Where:'''&lt;br /&gt;
Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156896</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156896"/>
				<updated>2013-08-16T15:50:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
'''Presenter:''' Jim Manico is the VP of Security Architecture for WhiteHat  Security, a web security firm. He authors and delivers developer security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156876</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156876"/>
				<updated>2013-08-16T07:18:35Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156875</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156875"/>
				<updated>2013-08-16T07:17:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Developers cannot defend against unknown threats.  Understanding vulnerabilities and security controls is an absolute necessity – not only for developers, but for Architects, QA and anyone else involved in the creation of software. This talk starts by making a strong argument for developer education, and how it fits into any organization’s SDLC. From there, we discuss other OWASP resources and projects dedicated to developer education, and an in-depth discussion of OWASP WebGoat.NET – an ASP.NET specific re-design of OWASP which meets the needs and addresses the challenges of modern application security training programs.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156874</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156874"/>
				<updated>2013-08-16T07:17:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff, Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156873</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156873"/>
				<updated>2013-08-16T07:16:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' Jerry Hoff &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whitehat Security, VP, Static Code Analysis Division; Managing Partner / Co-Founder, INFRARED SECURITY; Former Developer Security Consulting &amp;amp; FTE Across The Board; Over 10,000 Hours Delivering Technical Training; MS In Computer Science, Washington University&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156872</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156872"/>
				<updated>2013-08-16T07:15:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Topic: Demonstration of Common Web Vulnerabilities using WebGoat.NET'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter:'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:'''&lt;br /&gt;
&lt;br /&gt;
'''Speaker:'''&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156871</id>
		<title>Orange County</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Orange_County&amp;diff=156871"/>
				<updated>2013-08-16T07:13:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ron Perris: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Next Meeting = &lt;br /&gt;
&lt;br /&gt;
'''Tuesday, September 17, 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Demonstration of Common Web Vulnerabilities using WebGoat.NET '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RSVP: '''[http://www.meetup.com/OWASP-OC https://www.owasp.org/images/8/82/Meetup_logo3.jpg]'''&lt;br /&gt;
&lt;br /&gt;
= About OWASP Orange County =&lt;br /&gt;
&lt;br /&gt;
The OWASP Orange County email list can be found here [http://lists.owasp.org/mailman/listinfo/owasp-Orange_County http://lists.owasp.org/mailman/listinfo/owasp-Orange_County]. &lt;br /&gt;
&lt;br /&gt;
The chapter leader is [mailto:ron.perris@owasp.org Ron Perris].&lt;br /&gt;
&lt;br /&gt;
= Past Meetings = &lt;br /&gt;
&lt;br /&gt;
==== August 15th 2013 ====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Teaching your WAF new tricks'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Robert Rowley, Security Researcher'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' Not your uncle's &amp;quot;What's a WAF?&amp;quot; talk. I discuss basic of mod_security and how to extend your rule sets with lua scripts. Implementing automated response systems, better analytics on attacks and introducing counterintelligence tools all using an open source WAF.&lt;br /&gt;
&lt;br /&gt;
'''Speaker:''' A Security Researcher for Trustwave SpiderLabs, and part of the California security scene for the past decade. Previous to my work with SpiderLabs I worked as the security architect for a shared hosting company (who managed the web application firewall configuration for all 1mil+ websites hosted on the network).&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
&lt;br /&gt;
'''Schedule:'''&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
&lt;br /&gt;
6:30 - 7:10: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' '''[http://www.meetup.com/OWASP-OC http://img1.meetupstatic.com/892670376411449149876/img/header/logo.png]'''&lt;br /&gt;
&lt;br /&gt;
==== July 18th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: BSIMM'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Carl Schwarcz, Managing Consulting Cigital, Inc.'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Summary'''&amp;lt;br&amp;gt;&lt;br /&gt;
The presentation will discuss the nature and application of BSIMM, a software security maturity model in use by many major companies.  It will cover how BSIMM came about, how it is applied, and how companies use the results to increase their software security budgets and strengthen their software security programs.&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions 17871 Mitchell N # 100, Irvine, CA&lt;br /&gt;
Schedule:&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:30: Presentation &lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&lt;br /&gt;
==== May 21th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Jim Manico&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Title: Top Ten Web Defenses&lt;br /&gt;
&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past, security professionals thought firewalls, Secure Sockets Layer (SSL), patching, and privacy policies were enough. Today, however, these methods are outdated and ineffective, as attacks on prominent, well-protected websites are occurring every day. Citigroup, PBS, Sega, Nintendo, Gawker, AT&amp;amp;T, the CIA, the US Senate, NASA, Nasdaq, the NYSE, Zynga, and thousands of others have something in common – all have had websites compromised in the last year. No company or industry is immune. Programmers need to learn to build websites differently. This talk will review the top coding techniques developers need to master in order to build a low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat &lt;br /&gt;
Security, a web security firm. He authors and delivers developer &lt;br /&gt;
security awareness training for WhiteHat Security and has a background as a software developer and architect. Jim is also a global board member for the OWASP foundation. He manages and participates in several OWASP projects, including the OWASP cheat sheet series and the OWASP podcast series.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&amp;lt;br&amp;gt;&lt;br /&gt;
6:30 - 7:30: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== January 17th 2013====&lt;br /&gt;
&lt;br /&gt;
'''Topic: Putting your robots to work: security automation at Twitter'''&amp;lt;br&amp;gt;&lt;br /&gt;
'''Presenter: Neil Matatall and Justin Collins&amp;lt;br&amp;gt;'''&lt;br /&gt;
'''Summary:''' &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;quot;With daily code releases and a growing infrastructure, manually reviewing code changes and protecting against security regressions quickly becomes impractical. Even when using security tools, whether commercial or open source, the difficult work of integrating them into the development and security cycles remains. We need to use an automated approach to push these tools as close to when the code is written as possible, allowing us to prevent potential vulnerabilities before they are shipped. We worked with development, operations, and release teams to create a targeted suite of tools focused on specific security concerns that are effective and don’t introduce any noise. This presentation will give an overview of what we’ve done over the past year, what we have learned along the way, and will provide advice for anyone else going down this road as well as the philosophy that guided us along the way.&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Where: Crescent Solutions&lt;br /&gt;
17871 Mitchell N # 100, Irvine, CA&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Schedule:&amp;lt;br&amp;gt;&lt;br /&gt;
6:00 - 6:30: Introduction and networking&lt;br /&gt;
6:30 - 7:10: Presentation&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''RSVP here http://www.meetup.com/OWASP-OC'''&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP LA Event: Security Summit: April 25, 2012, 3:00PM - 8PM  ====&lt;br /&gt;
&lt;br /&gt;
(Note different time and location)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jerry Hoff VP, Static Code Analysis Division at WhiteHat Security, will be speaking about Webgoat. Shakeel Tufail, Federal Practice Director for HP Enterprise Security Solutions, will be speaking on securing software. Noa Bar Yosef, Senior Security Strategist at Imperva, will be speaking on &amp;quot;De-Anonymizing Anonymous&amp;quot;. A concluding panel, moderated by Richard Greenberg, Information Security Officer for LA County Public Health, will have the speakers joined by Adnan Masood, a Software Engineer and Architect.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== March 28th 2012 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: March 28th 7pm&lt;br /&gt;
&lt;br /&gt;
Where: Irvine - 5151 California Ave, Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:30: Presentation&lt;br /&gt;
&lt;br /&gt;
====&amp;quot;WebGoat.NET&amp;quot;====&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
Jerry Hoff, the project leader of the OWASP Appsec Tutorial Series, and VP of the Static Code Analysis Division at WhiteHat Security, will be discussing his newest OWASP project, WebGoat.NET.  For many years, the Java version of WebGoat has been available as a fantastic tool for learning application security from the Java perspective.  Jerry has now created a parallel tool for ASP.NET developers to learn about application security.  Jerry will be discussing how this tool can be used in a learning environment, and other issues related to application security education.&lt;br /&gt;
&lt;br /&gt;
====Speaker Bio:====&lt;br /&gt;
Jerry Hoff is vice president of the Static Code Analysis division at WhiteHat Security. In this role, he oversees the development of WhiteHats cloud-based static application security testing (SAST) service. Prior to WhiteHat, Mr. Hoff was co-founder and managing partner ofInfrared Security, a leading application security professional services firm. Mr. Hoff is an experienced application security consultant with years of professional development and training delivery. He is also the lead of the OWASP AppSec Tutorial Series. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== September 14th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
When: Wednesday September 17th 7pm&lt;br /&gt;
Where: TBD (Irvine)&lt;br /&gt;
http://www.meetup.com/ocrails/events/30043551/&lt;br /&gt;
&lt;br /&gt;
Loose Schedule:&lt;br /&gt;
7:00 - 7:30: Introduction and networking&lt;br /&gt;
7:30 - 8:00: Brakeman with Justin Collins&lt;br /&gt;
8:00 - 8:15: Lightning Rounds&lt;br /&gt;
8:15 - 8:30: Brakeman Demo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Brakeman with Justin Collins: &lt;br /&gt;
While the popular Ruby on Rails web framework provides built-in protection &lt;br /&gt;
for many security vulnerabilities, it is still possible to misuse these&lt;br /&gt;
features or introduce other vulnerabilities to an application. Brakeman is a static code analysis tool designed specifically to find vulnerabilities and configuration issues  in Ruby on Rails applications. Since it works at the source code level, Brakeman can be used at any point in development without the need for deploying the full application stack. To make it even simpler, &lt;br /&gt;
Brakeman can be integrated with Hudson/Jenkins to provide automatic monitoring of Brakeman results as code is committed. This talk will discuss how to use Brakeman and how it can help you create safer Rails applications.&lt;br /&gt;
&lt;br /&gt;
Lightning Rounds:&lt;br /&gt;
&lt;br /&gt;
Neil Matatall: Friendly_id + ancsetry&lt;br /&gt;
&lt;br /&gt;
Drew Deponte: Guard, spork, BDD&lt;br /&gt;
&lt;br /&gt;
==== June 29th 2011 7PM ====&lt;br /&gt;
&lt;br /&gt;
[[http://owaspoc.eventbrite.com/ Registration Link]]&lt;br /&gt;
&lt;br /&gt;
'''When''': Wednesday june 29th, 2011 7pm&lt;br /&gt;
&lt;br /&gt;
'''Where:  HireRight Offices'''&lt;br /&gt;
5151 California Avenue&lt;br /&gt;
Irvine, CA 92617&lt;br /&gt;
&lt;br /&gt;
'''Pizza and refreshments will be provided by the sponsors of this meeting.&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
===== Meeting Sponsors =====&lt;br /&gt;
 &lt;br /&gt;
Food and refreshments:&lt;br /&gt;
[[File:AppSecDC2010-Sponsor-trustwave.gif]]&lt;br /&gt;
&lt;br /&gt;
Meeting location:&lt;br /&gt;
[[File:Hireright.png]]&lt;br /&gt;
 &lt;br /&gt;
===== Presentation Topic: =====&lt;br /&gt;
Featuring analysis of more than 220 data breach investigations and more than 2,300 penetration tests conducted by Trustwave's SpiderLabs, the Global Security Report 2011 identifies the top vulnerabilities business encountered in 2010 as well as a list of strategic initiatives to help your business improve its overall security.&lt;br /&gt;
 &lt;br /&gt;
The data gathered from these engagements is substantial and comprehensive. This presentation will be a summary of the results of the analysis of the data gathered during 2010. The results will be presented both technical and business impact analysis.&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
===== Charles Henderson, Director of Application Security Services of SpiderLabs at Trustwave =====&lt;br /&gt;
 &lt;br /&gt;
Henderson began his career in computer security in 1993, specializing in penetration testing as well as security and vulnerability research. As Director of Application Security Services at SpiderLabs, he leads the team responsible for Application Penetration Testing, Code Review, Secure Development Training, and other elite application security consulting services.&lt;br /&gt;
 &lt;br /&gt;
Prior to joining SpiderLabs, Henderson ran his own boutique application&lt;br /&gt;
security testing firm. Henderson’s firm provided offensive security services to a wide variety of clients in the United States and Europe.&lt;br /&gt;
 &lt;br /&gt;
Henderson speaks frequently at major industry events and conferences, including BlackHat, DEF CON,  AppSec US, AppSec EU, SOURCE, and the International Association of Financial Crime Investigators convention.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 28th, 2011====&lt;br /&gt;
&lt;br /&gt;
'''Registration link: [https://www.regonline.com/owasp_oc_jan]'''&lt;br /&gt;
&lt;br /&gt;
'''Time:''' 1 PM - 5PM&lt;br /&gt;
&lt;br /&gt;
'''Location: '''&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=5151+California+Ave&amp;amp;sll=33.621597,-117.740797&amp;amp;sspn=0.010489,0.019011&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=5151+California+Ave,+Irvine,+Orange,+California+92617&amp;amp;z=16&amp;amp;iwloc=A Hireright] &lt;br /&gt;
&lt;br /&gt;
5151 California Ave&lt;br /&gt;
&lt;br /&gt;
Irvine, California 92617&lt;br /&gt;
&lt;br /&gt;
United States.   &lt;br /&gt;
&lt;br /&gt;
'''Topics:''' Threat Modeling, Application Security&lt;br /&gt;
&lt;br /&gt;
'''Food:''' Provided&lt;br /&gt;
&lt;br /&gt;
Speakers:  &lt;br /&gt;
&lt;br /&gt;
'''Samy Kamkar'''&lt;br /&gt;
&lt;br /&gt;
Online Privacy and the Evercookie&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Samy Kamkar has lectured on computer security issues in over a dozen&lt;br /&gt;
countries, and his work has been featured on the front page of the New&lt;br /&gt;
York Times. As a grey-hat hacker, he makes and breaks computer&lt;br /&gt;
security for tech companies. In addition to his independent security&lt;br /&gt;
research, he co-founded Fonality, an IP PBX company.&lt;br /&gt;
&lt;br /&gt;
'''Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Back to Basics: Defensive Coding Principles for Web Development 101&lt;br /&gt;
&lt;br /&gt;
The application security community is in deep need of prescriptive&lt;br /&gt;
solutions for developers. This talk will review the world of Web&lt;br /&gt;
Application Security from a &amp;quot;builder&amp;quot; point of view, focusing on&lt;br /&gt;
critical controls that all developers must master if they wish to build&lt;br /&gt;
low risk web applications today.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the chair of the OWASP Connections committee where he&lt;br /&gt;
focuses on producing and hosting the OWASP Podcast. Jim also is a&lt;br /&gt;
co-manager of the OWASP ESAPI Open Source project. Professionally, Jim&lt;br /&gt;
is an independent application security architect specializing in the&lt;br /&gt;
construction of low-risk web applications. Jim is also an application&lt;br /&gt;
security educator and assessment specialist.&lt;br /&gt;
&lt;br /&gt;
'''Edward Bonver'''&lt;br /&gt;
Talk Title:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling at Symantec&lt;br /&gt;
[[File:OWASP-WWW-2011-Edward-Bonver-Threat-Modelint-at-Symantec.pptx]]&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Threat Modeling is one of the most important security activities that a development/QA team needs to perform as part of a Security Development Lifecycle. This activity allows the team to build a complete security profile of the system being built. Threat Modeling is not always easy to get going for a team that has little or no security experience. In this presentation we’ll take a look at why Threat Modeling is so important; we’ll explore the process behind it, and how the process is being implemented and followed across Symantec.&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Edward Bonver is a principal software engineer on the product security team under the Office of the CTO at Symantec Corporation.  In this capacity, Edward is responsible for working with software developers and quality assurance (QA) professionals across Symantec to continuously enhance the company’s software security practices through the adoption of methodologies, procedures and tools for secure coding and security testing.  Within Symantec, Edward teaches secure coding and security testing classes for Symantec engineers, and also leads the company’s QA Security Task Force, which he founded.  Prior to joining Symantec, Edward held software engineering and QA roles at Digital Equipment Corporation, Nbase and Zuma Networks. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Edward is a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).  He holds a master’s degree in computer science from California State University, Northridge, and a bachelor’s degree in computer science from Rochester Institute of Technology. Edward is a Ph.D. student at NOVA Southeastern University.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, January 21st 2010====&lt;br /&gt;
&lt;br /&gt;
Time: 7:30&lt;br /&gt;
Location: We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus. The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020. Parking is $7 but feel free to park off campus and walk to the building. http://www.oit.uci.edu/computing/labs/training.html Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdfBD&lt;br /&gt;
&lt;br /&gt;
For those who would like to avoid paying for parking, you can park in the University Center and take the campus shuttle: http://www.shuttle.uci.edu/maincampus/index.php&lt;br /&gt;
&lt;br /&gt;
The shuttle runs until 10:45PM.  The shuttle costs $1 per ride, but fees are rarely collected ;)&lt;br /&gt;
&lt;br /&gt;
Title: Do VLANs allow for good application security? &lt;br /&gt;
 &lt;br /&gt;
Virtual Local Area Networks (VLANs) are not a new concept, and can help&lt;br /&gt;
any organization better control network access.  I will present some of&lt;br /&gt;
the previous issues identified, what was the root cause, and how these&lt;br /&gt;
have been fixed in current technology.  In addition we will talk about&lt;br /&gt;
how this can help to enhance security in your environment, and what&lt;br /&gt;
controls must be in place in order to implement such an environment.  We&lt;br /&gt;
will also touch on how this can complicate your application environment,&lt;br /&gt;
but improve overall security.&lt;br /&gt;
&lt;br /&gt;
I will touch on the controls that need to be reviewed and audited when&lt;br /&gt;
working with VMware, VLANs, and web applications, to ensure that these&lt;br /&gt;
networks are secure, and what to look for to potentially pass audit&lt;br /&gt;
criteria.  I will also talk about where and how these controls have been&lt;br /&gt;
implemented in order to protect thousands of users while accessing one&lt;br /&gt;
of the most hostile networks in the world.&lt;br /&gt;
&lt;br /&gt;
David M. N. Bryan &lt;br /&gt;
Senior Security Consultant &lt;br /&gt;
&lt;br /&gt;
David has over 9+ years of computer security experience including,&lt;br /&gt;
consulting, engineering and administration.  He has performed security&lt;br /&gt;
assessment projects for health care, nuclear, manufacturing,&lt;br /&gt;
pharmaceutical, banking and educational sectors.   As an active&lt;br /&gt;
participant in the information security community, he volunteers at&lt;br /&gt;
DEFCON where he designs and implements the Firewall and Network for what&lt;br /&gt;
is said to be the most hostile network environment in the world.  &lt;br /&gt;
&lt;br /&gt;
He is also an active participant in the local Minneapolis security&lt;br /&gt;
groups both as a board member of OWASP MSP and DC612.  His roots and&lt;br /&gt;
experience come from working for a large enterprise banks, designing and&lt;br /&gt;
managing enterprise security systems.  In the more recent years he has&lt;br /&gt;
been working as an Information Security Consultant to review the&lt;br /&gt;
security and architecture of information computing environments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday December 17th 2009====&lt;br /&gt;
&lt;br /&gt;
7:30 PM, UC Irvine Campus, Room AIRB 1020&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We will be meeting in the Anteater Instruction and Research Building on the UC Irvine campus.  The building itself is inside of the Anteater Parking Structure at the corner of E. Peltason Dr and Anteater Dr and is room number 1020.  Parking is $7 but feel free to park off campus and walk to the building.&lt;br /&gt;
http://www.oit.uci.edu/computing/labs/training.html&lt;br /&gt;
Buliding #653 in quadrant H9 on the campus map - http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf&lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&lt;br /&gt;
&lt;br /&gt;
'''Title: Pulling the Plug: Security Risks in the Next Generation of Offline Web Applications'''&lt;br /&gt;
&lt;br /&gt;
As the line between desktop and web applications becomes increasingly blurry in a web 2.0 world, browser functionality is being pushed well beyond what it was originally intended for. Persistent client side storage has become a requirement for web applications if they are to be available both online and off. This need is being filled by a variety of technologies such as [http://webkit.org/blog/126/webkit-does-html5-client-side-database-storage Gears (formerly Google Gears) and the Database Storage]   functionality included in the emerging [http://dev.w3.org/html5/spec/Overview.html HTML 5 specification]. While all such technologies offer great promise, it is clear that the vast majority of developers simply do not understand their security implications.&lt;br /&gt;
&lt;br /&gt;
Researching a variety of currently deployed implementations of these technologies has revealed a broad scope of vulnerabilities with frightening implications. Now attackers can target victims not just once, but every time they visit a site as the victim now carries and stores the attack with them. Imagine a scenario whereby updated confidential information is forwarded to an attacker every time a victim interacts with a given we application. The attacker no longer needs to worry about timing their attacks to ensure that the victim is authenticated as the victim attacks himself! Limited storage? Cookies that expire? Not a problem when entire databases are accessible with virtually unlimited storage and an infinite lifespan. Think these attacks are theoretical? Think again. In this talk we dive into these technologies and break down the risk posed by them when not properly understood. We will then detail a variety of real-world vulnerabilities that have been uncovered, including a new class of cross-site scripting and client-side SQL injection.&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
'''Michael Sutton'''&lt;br /&gt;
'''Vice President, Security Research – Zscaler'''&lt;br /&gt;
&lt;br /&gt;
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers and educating others on a variety of security topics. As VP of Security Research, Michael heads Zscaler Labs, the research and development arm of the company. Zscaler Labs is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry.    &lt;br /&gt;
&lt;br /&gt;
Prior to joining Zscaler, Michael was the Security Evangelist for SPI Dynamics where, as an industry expert, he was responsible for researching, publishing and presenting on various security issues. In 2007, SPI Dynamics was acquired by Hewlett-Packard. Previously, Michael was a Research Director at iDefense where he led iDefense Labs, a team responsible for discovering and researching security vulnerabilities in a variety of technologies. iDefense was acquired by VeriSign in 2005. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Thursday, November 19th 2009====&lt;br /&gt;
&lt;br /&gt;
When: November 19th 2009, 7:30PM&lt;br /&gt;
Where: Gina's Pizza, Irvine&lt;br /&gt;
Topics: Facebook privacy, web application firewalls, penetration testing, the reluctance for hackers to execute attacks, and random new technology.  Announced OWASP OC/LAs intention to submit a proposal for AppSec 2010.&lt;br /&gt;
&lt;br /&gt;
====Wednesday, October 14th 2009====&lt;br /&gt;
&lt;br /&gt;
Separate meetings will be held for OWASP OC and OWASP@UCI (student group).&lt;br /&gt;
&lt;br /&gt;
When:  Wednesday 10/14  7:30PM&lt;br /&gt;
Where:  Steelhead Brewery&lt;br /&gt;
Topics:  News, Ideas, Chit-chat&lt;br /&gt;
&lt;br /&gt;
This is a restaurant/bar with plenty of seating, but room for a projector is out of the question so this would be an informal round table discussion.&lt;br /&gt;
&lt;br /&gt;
I have a presentation I'm working on regarding WAFs and Vulnerability Assessment Tools.  If it pleases the group, I'd love to go over the presentation and discuss everyone's experiences.  Also, it's a great way to get feedback :)&lt;br /&gt;
&lt;br /&gt;
Neil&lt;br /&gt;
&lt;br /&gt;
I'm open to suggestions of any kind: location, time, topics, etc&lt;br /&gt;
&lt;br /&gt;
====Thursday, September 17th, 2009 7:30PM ====&lt;br /&gt;
'''Location:''' UC Irvine &lt;br /&gt;
Building: Calit2 building,building number 325 in quadrant H8 on the [http://today.uci.edu/pdf/UCI_09_map_campus_core.pdf UC Irvine Map]&lt;br /&gt;
Room: 3008&lt;br /&gt;
&lt;br /&gt;
Parking will be $7.&lt;br /&gt;
Please park in the [http://maps.google.com/maps?li=d&amp;amp;hl=en&amp;amp;f=d&amp;amp;iwstate1=dir:to&amp;amp;daddr=Parking+Structure+for+CalIT2%4033.643082,+-117.837593&amp;amp;geocode=CSJ9b4xJxrzxFUpaAQId5_D5-A&amp;amp;iwloc=1&amp;amp;dq=calit2,+uc+irvine,+ca&amp;amp;cid=33643082,-117837593,16505793731713499531&amp;amp;ei=v3bvSabfO6LejAOR2pjgAQ Anteater Parking Structure]&lt;br /&gt;
&lt;br /&gt;
I can only unofficially say that if you park in the nearby shopping centers and walk, you may be able to park for free.&lt;br /&gt;
&lt;br /&gt;
* &amp;lt;b&amp;gt;The Rise of Threat Analysis and the Fall of Compliance, Policies, and Standards in mitigating Web Application Security Risks&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Apr 30, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Our fourth OC OWASP meeting will be an informal, roundtable discussion of current application security issues. Feel free to bring some ideas, code, slides, etc to contribute to the discussion. Hope to see everyone there!&lt;br /&gt;
&lt;br /&gt;
====Feb 19, 2009 6:30PM-8:30PM====&lt;br /&gt;
Brooklyn Pizza Works, 1235 East Imperial Highway, Placentia, CA&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?q=1235+East+Imperial+Highway,+placentia,+ca&amp;amp;oe=utf-8&amp;amp;client=firefox-a&amp;amp;ie=UTF8&amp;amp;split=0&amp;amp;gl=us&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come talk application security at the third OWASP OC meeting. We'll discuss current application security topics and chapter issues over pizza. We have a room booked for 15-20 people so we'll be able to rant without disturbing the patrons :) See you there! [https://www.owasp.org/images/5/58/Cloud_Computing_Security.pdf Presentation Slides]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Dec 17, 2008 6PM - 9PM====&lt;br /&gt;
Microsoft Campus&lt;br /&gt;
Room MPR1, 3 Park Plaza, Suite 1600, Irvine, CA, 92614&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=microsoft,+Irvine,+CA,+92614&amp;amp;sll=33.678479,-117.838368&amp;amp;sspn=0.009892,0.022745&amp;amp;g=3+Park+Plaza,+Irvine,+CA,+92614&amp;amp;ie=UTF8&amp;amp;ei=sCFJSfKPEo3UNc2ZmCc&amp;amp;cd=1&amp;amp;cid=33728042,-117783305,17507068988286890825&amp;amp;li=lmd&amp;amp;ll=33.731835,-117.78142&amp;amp;spn=0.039545,0.090981&amp;amp;z=14&amp;amp;iwloc=A Google Map]&lt;br /&gt;
&lt;br /&gt;
This meeting will be a roundtable discussion of application security news, plus a few OWASP-themed challenges with prizes. Pizza will be provided and we'll head to the Yard House after the meeting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Aug 27, 2008, 7 PM - 9 PM====&lt;br /&gt;
Penny Saver&lt;br /&gt;
&lt;br /&gt;
603 Valencia, Brea, CA 92822&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=603+valencia,+Brea,+CA+92822&amp;amp;sll=33.911348,-117.851629&amp;amp;sspn=0.009865,0.022745&amp;amp;ie=UTF8&amp;amp;ll=33.909478,-117.852917&amp;amp;spn=0.009866,0.022745&amp;amp;z=16&amp;amp;iwloc=addr Google Map]&lt;br /&gt;
&lt;br /&gt;
Come meet up with web security professionals, have some pizza, and offer your thoughts for the direction of the OC chapter at our inaugural meeting! We are looking for speakers and venue sponsors for the next meeting. If you are interested, please contact the chapter leaders. Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
&lt;br /&gt;
= Orange County OWASP Board Members =&lt;br /&gt;
&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County President&amp;lt;/b&amp;gt; [mailto:ron.perris@owasp.org Ron Perris]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Vice-President&amp;lt;/b&amp;gt; [mailto:shong.chong@owasp.org Shong Chong]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Membership Director:&amp;lt;/b&amp;gt; [mailto:ryan@captiveeight.com Ryan Heiserman]&lt;br /&gt;
*&amp;lt;b&amp;gt;Orange County Board Member&amp;lt;/b&amp;gt; [mailto:neil@owasp.org Neil Matatall]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ron Perris</name></author>	</entry>

	</feed>