<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ryan+Behan</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ryan+Behan"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ryan_Behan"/>
		<updated>2026-05-23T01:47:02Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=173699</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=173699"/>
				<updated>2014-04-28T18:52:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://appsecusa.org/2013/activities/owasp-women-in-application-security-appsec-program/ '''Long Island chapter is a proud sponsor of Women in AppSec 2013''']  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[https://myowasp.force.com/memberappregion '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&amp;lt;br&amp;gt; Corporate Silver Supporter: [[File:Secdec-logo_division.png|200x100px|link=http://securedecisions.com/]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;April 28 2014&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
* Time: Monday April 28, 2014 @ 7:00PM&lt;br /&gt;
* Location TIBCO Office 200 Garden City Plaza, Suite 220, Garden City, NY 11530 &lt;br /&gt;
* Directions:  [https://maps.google.com/maps?hl=en&amp;amp;q=200++Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ie=UTF-8&amp;amp;hq=&amp;amp;hnear=0x89c27d7c971cb6db:0x3b25e3102c9f3ded,200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;gl=us&amp;amp;daddr=200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ei=yIRUUcqLI5HE4AP2sYGACg&amp;amp;ved=0CC4QwwUwAA Map]&lt;br /&gt;
&lt;br /&gt;
A simple dinner will be provided. RSVP requested.&lt;br /&gt;
&lt;br /&gt;
[http://securedecisions.com/ Secure Decisions], a division of [http://www.avi.com/ Applied Visions Inc.] is a sponsor of this meeting.&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.tibco.com/ TIBCO Software Inc.] is a sponsor of this meeting.&lt;br /&gt;
&lt;br /&gt;
This is a meeting to brainstorm ideas on how to outreach and organize chapter activities. This is also a greet and meet opportunity for people who want to join the chapter board. Whether you are ready to join the board or not, you are welcome to the meeting or email your suggestions to helen.gao at owasp.org.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;May 2014&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
* Time: May, 2014. Details to be determined.&lt;br /&gt;
* Location (tentative): '''TIBCO Office''' 200 Garden City Plaza, Suite 220, Garden City, NY 11530 &lt;br /&gt;
* Directions:  [https://maps.google.com/maps?hl=en&amp;amp;q=200++Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ie=UTF-8&amp;amp;hq=&amp;amp;hnear=0x89c27d7c971cb6db:0x3b25e3102c9f3ded,200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;gl=us&amp;amp;daddr=200+Garden+City+Plaza,+Garden+City,+NY+11530&amp;amp;ei=yIRUUcqLI5HE4AP2sYGACg&amp;amp;ved=0CC4QwwUwAA Map]&lt;br /&gt;
&lt;br /&gt;
[http://securedecisions.com/ Secure Decisions], a division of [http://www.avi.com/ Applied Visions Inc.] is a sponsor of this meeting.&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.tibco.com/ TIBCO Software Inc.] is a sponsor of this meeting.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;Sept. 2014&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
* Details to be determined.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=141089</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=141089"/>
				<updated>2012-12-13T02:09:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h4&amp;gt;&amp;lt;i&amp;gt;The 12/13/2012 meeting room has changed to room 204 on the second floor of Hagedorn Hall of Enterprise.&amp;lt;/i&amp;gt;&amp;lt;/h4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Threat Modeling'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.eventbrite.com/event/4962223143 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 204 on the second floor of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=140595</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=140595"/>
				<updated>2012-12-03T02:34:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
'''Dr. Kees Leune - Threat Modeling'''&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.eventbrite.com/event/4962223143 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=140594</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=140594"/>
				<updated>2012-12-03T01:46:49Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
'''Dr. Kees Leune - Threat Modeling'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
==''' September Meeting '''==&lt;br /&gt;
Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
* Date: Monday, September 24, 2012&lt;br /&gt;
* Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi &lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136470</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136470"/>
				<updated>2012-09-25T16:35:12Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''September 24th, Chapter Meeting Session Recording:  http://www.youtube.com/watch?v=r12yiXnagbY&amp;amp;sns=em''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For those who cannot make the trip or unable to get a registration slot, Adelphi University will be graciously providing a live feed.  You can connect to the feed one hour prior to the meeting.  Please sign in as guest, there will be an option provided on the login form prior to the meeting.&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;[https://adelphi.adobeconnect.com/_a839711231/owasp The URL for this live feed can be found here].&amp;lt;/strong&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136297</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136297"/>
				<updated>2012-09-22T02:17:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For those who cannot make the trip or unable to get a registration slot, Adelphi University will be graciously providing a live feed.  You can connect to the feed one hour prior to the meeting.  Please sign in as guest, there will be an option provided on the login form prior to the meeting.&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;[https://adelphi.adobeconnect.com/_a839711231/owasp The URL for this live feed can be found here].&amp;lt;/strong&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136296</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=136296"/>
				<updated>2012-09-22T02:14:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
Important update:&amp;lt;br/&amp;gt;&lt;br /&gt;
'''The September 25 meeting has been moved to September 24''' &amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Important :: Due to scheduling conflicts the chapter leaders have made the decision to move the September meeting date to Monday September 24th.  Please modify your registration accordingly or register using the link below.... &amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
OWASP LI greatly apologize for any Inconvenience this may cause and look forward to seeing you at the meeting.   &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
In order to accommodate a larger group for the  Monday September 24th meeting, the room has changed.  Please see the meeting details below.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For those who cannot make the trip or unable to get a registration slot, Adelphi University will be graciously providing a live feed.  &lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;ul&amp;gt;&amp;lt;li&amp;gt;&lt;br /&gt;
&amp;lt;strong&amp;gt;[https://adelphi.adobeconnect.com/_a839711231/owasp The URL for this live feed can be found here].&amp;lt;/strong&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&amp;lt;/ul&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/24/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Time: 6:30pm - 9:00 pm&lt;br /&gt;
* Location: '''Room 108 on the first level of Hagedorn Hall of Enterprise''' (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map].&lt;br /&gt;
&lt;br /&gt;
*Agenda:Jim Manico will be presenting on the topic of Top 10 Web Defenses through Secure Application Programming&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Abstract:&amp;lt;/strong&amp;gt; Top Ten Web Defenses We cannot hack or firewall our way&lt;br /&gt;
secure. Application programmers need to learn to code in a secure&lt;br /&gt;
fashion if we have any chance of providing organizations with proper&lt;br /&gt;
defenses in the current threatscape. This talk will discuss the 10&lt;br /&gt;
most important security-centric computer programming techniques&lt;br /&gt;
necessary to build low-risk web-based applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;strong&amp;gt;Speaker Bio:&amp;lt;/strong&amp;gt; Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm.  Jim is a participant and project&lt;br /&gt;
manager of the OWASP Developer Cheatsheet series. He is also the&lt;br /&gt;
producer and host of the OWASP Podcast Series.&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://owaspli_sept2012.eventbrite.com http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Important:: RegOnline has been deactivated as of August 1st., If you had RSVP'd previously using regonline, We ask that you please redo your RSVP.  Apologies for the Inconvenience.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change, please check back frequently for updates'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;December 13, 2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
=='''May Meeting'''==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''February Meeting'''==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''November'''==&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=='''September'''==&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=130840</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=130840"/>
				<updated>2012-06-01T13:12:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''A Message From The Chapter''' ==&lt;br /&gt;
&lt;br /&gt;
To our membership and prospective learners, the May meeting was great.  Many thanks to Kees Leune and Adelphi University for hosting the event.  Jack Mannino was great, the presentation on Android was catalyst for great dialog amongst a full room of attendees.  Looking forwards to seeing everyone in September.  If anyone is interested in having a summer meeting, please [mailto:ryan.behan@owasp.org contact me]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''May Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/Register/Checkin.aspx?EventID=1089917 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''February Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=130839</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=130839"/>
				<updated>2012-06-01T12:59:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
[http://www.cvent.com/d/gcqpwh/3W '''Become a Member NOW''']&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''Next Meetings''' ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;9/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;strong&amp;gt;12/13/2012&amp;lt;/strong&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
*Details TBD&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''May Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. Directions:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] Enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/Register/Checkin.aspx?EventID=1089917 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  The meeting space is limited; register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly or email one of the leaders. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks One of Jack's presentations on mobile security]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''February Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks OWASP Top 10 Mobile Risk presentation in AppSec DC on April, 2012. By Jack Mannino, Mike Zusman, Zach Lanier]&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=128174</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=128174"/>
				<updated>2012-04-20T01:24:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''May Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 10, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/Register/Checkin.aspx?EventID=1089917 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Practical Android Security'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
&lt;br /&gt;
Building secure Android applications can be achieved with a mix of common sense, leveraging platform security features, and following secure development best practices. This presentation will focus on security “quick wins” during development and will cover techniques that can reduce the overall attack surface within Android applications.&lt;br /&gt;
 &lt;br /&gt;
The OWASP GoatDroid and OWASP MobiSec tools will be used throughout the presentation to demonstrate issues encountered in the real world. We will cover the attack surface for Android and highlight the most prevalent security flaws found within production applications.&lt;br /&gt;
  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Topics:&lt;br /&gt;
*Mobile Application Security&lt;br /&gt;
*OWASP GoatDroid&lt;br /&gt;
*OWASP MobiSec&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, an application security firm located within the Washington DC area. At nVisium, he helps to ensure that large corporations, government agencies, and software startups have the tools they need to build and maintain successful application security initiatives. He is an active Android security researcher, and has a keen interest in identifying security issues and trends on a large scale. Jack is the leader and founder of the OWASP Mobile Security Project. He also serves as a board member on the OWASP Northern Virginia chapter. Jack is also the lead developer for the OWASP GoatDroid Project, which is a collection of vulnerable Android applications used for training and education.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''February Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=127616</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=127616"/>
				<updated>2012-04-10T01:42:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''May Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
''' Guest Speaker Jack Mannino discusses the OWASP Top 10 Mobile Risks ''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, May 20&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
*''Free pizza and beverage will be provided.'' &lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/Register/Checkin.aspx?EventID=1089917 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''OWASP Top 10 Mobile Risks'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Mobile Application Security&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Jack Mannino is the CEO of nVisium Security, a leading provider of mobile application and web application security services. At nVisium he is responsible for ensuring that all services are delivered at the highest levels of quality and with keen attention to detail.  He focuses on mobile application security research (especially Android), and is the co-leader of the OWASP Mobile Security Project. In addition to the Mobile Security Project, Jack is also heavily involved with the OWASP Northern Virginia Chapter where he serves as a member of the chapter's board.&lt;br /&gt;
In the past, Jack honorably served in the United States Navy.  He has spoken at OWASP events, ISSA events, and cyber security conferences for the Department of Defense.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''February Meeting'''&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17, 2012&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/OWASP_Jobs OWASP Job Board]&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=126715</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=126715"/>
				<updated>2012-03-22T14:11:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
cor&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=126714</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=126714"/>
				<updated>2012-03-22T14:10:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
cor&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
=News and Chapter Meetings=&lt;br /&gt;
&lt;br /&gt;
== '''February Meeting''' ==&lt;br /&gt;
&lt;br /&gt;
'''In a continuation of the previous meeting we have once again organized a lab to demonstrate the OWASP top 10 vulnerabilities.  Please find the details below''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, February 16&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASP_LI_Feb2012 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directions to Adelphi University:  [http://maps.google.com/maps?hl=en&amp;amp;sugexp=kjrmc&amp;amp;cp=8&amp;amp;gs_id=v&amp;amp;xhr=t&amp;amp;qe=QWRlbHBoaSA&amp;amp;qesig=JiDWqoZNuHjzxH4mu6hKFg&amp;amp;pkc=AFgZ2tkIdEHC3xl3TdCwzVHV-FzgNlMu6AZnN1IK_YD8inckTi6GpPNW_NXm1BSV3gh-c-dec9v32CZ8YRCkAnZnP8Jja8WVtw&amp;amp;gs_upl=&amp;amp;bav=on.2,or.r_gc.r_pw.,cf.osb&amp;amp;biw=1302&amp;amp;bih=938&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,9404387279279361491&amp;amp;fb=1&amp;amp;hq=adelphi+university&amp;amp;hnear=0x89c286e540a98237:0x6a5b71f23a74346c,Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=1+South+Avenue,+Garden+City,+NY+11530-0701&amp;amp;geocode=0,40.721203,-73.652149&amp;amp;ei=xHScTsqnMefm0QGXhpiaBA&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=1&amp;amp;ved=0CFYQngIwAA Map]  |  [http://www.adelphi.edu/visitors/campus.php Campus Map] &amp;lt;br&amp;gt;&lt;br /&gt;
Once at the building, enter the building from the North and go down the stairs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike):To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot.  [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at a future meeting, please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=Calendar=&lt;br /&gt;
&lt;br /&gt;
'''2012 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;br&amp;gt; February 2012&lt;br /&gt;
&lt;br /&gt;
*Time: 7:00pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Adelphi University &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: OWASP top 10 Vulnerability Lab &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Past Meetings=&lt;br /&gt;
&lt;br /&gt;
'''November'''&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday, November 17&lt;br /&gt;
* Location: IT conference room in the lower level of Hagedorn Hall of Enterprise (Building HHE on Map upper right), Adelphi University. &lt;br /&gt;
* Time: 7:00pm-9:30pm&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Registration Details:  This chapter meeting has been organized to be a lab; as a result, space is limited in the room to a maximum of 21 people.  Register early and be considerate of others; if you find that you cannot attend afterwards, please modify your registration accordingly. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Meeting Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Dr. Kees Leune - Lab utilizing some of the OWASP 10 vulnerabilities with BackTrack 5.'''&lt;br /&gt;
  &lt;br /&gt;
Topics:&lt;br /&gt;
**Overview of BackTrack&lt;br /&gt;
**Overview of some tools on BackTrack (nmap, JohnTheRipper,MetaSploit)&lt;br /&gt;
**Overview of the lab challenge (covers multiple owasp top 10 vulns)&lt;br /&gt;
&lt;br /&gt;
'''''Laptops are needed if you wish to participate in the lab exercise!'''''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''' - &lt;br /&gt;
&lt;br /&gt;
Dr. Kees Leune is an Information Security Officer, Strategist, Professor, Mentor, Adviser, Consultant, Speaker and occasional open source developer. He blogs at http://www.leune.org and can be found on Twitter as @leune. Kees has extensive experience in information security and holds several professional certifications, including the CISSP, GCIH, GCFA, CISM, and CISA.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''September'''&lt;br /&gt;
*Date: Thursday, September 22, 2011 &lt;br /&gt;
*Time: 6:30pm - 9:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
'''Helen Gao - [https://www.owasp.org/images/c/c3/OWASPTop10XSSLongIsland.pdf Cross-site scripting], the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Topics - &lt;br /&gt;
Recent Attack on Infraguard Website.&lt;br /&gt;
Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like? &lt;br /&gt;
LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets?&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker -''' Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''May'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: Student Center, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.'' &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Chapter Board Members and Contacts=&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114439</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=114439"/>
				<updated>2011-07-22T18:40:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}} &lt;br /&gt;
&lt;br /&gt;
==== News &amp;amp;amp; Chapter Meeting  ====&lt;br /&gt;
&lt;br /&gt;
''' UPDATED - Details for the next Long Island Chapter meeting are below:''' &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Date: Thursday July, 28&lt;br /&gt;
* Location: Student Center #143, Hofstra University, Hempstead, NY 11549-1000 &lt;br /&gt;
* Time: 6:30pm-9:30pm&lt;br /&gt;
* Agenda:&lt;br /&gt;
&lt;br /&gt;
'''Helen Gao - Cross-site scripting, the most prevalent. Web application vulnerability:''' &amp;lt;br&amp;gt;&lt;br /&gt;
Helen will discuss one of the most widespread Web application Vulnerabilities.  How can an application be attacked and how to protect yourself. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
About the Speaker - Helen Gao has worked in the field of information security since 1991. Helen has worked as an application developer, project manager, and software architect. Her employment history includes working at a financial institution, a market research company, a high-tech device manufacturer and a software company.  Helen is currently a senior architect at TIBCO Software Inc. Her job duties include the design and development of complex event processing software. The protection of information security in such systems is challenging, due to their strict performance requirements in terms of high event throughput and low processing latency. Helen welcomes the challenge and uses the knowledge she obtained from OWASP to manage project life cycles. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Round Table Discussions Coordinated by Ryan Behan:''' &lt;br /&gt;
** Recent Attack on Infraguard Website.&lt;br /&gt;
** Security as a Service Model vs. Internally Managed Security -Five years from now, what will IT look like?&lt;br /&gt;
** LulzSec, Anonymous, A-Team - Motivations for attacks?  How do small-medium size businesses protect themselves from this?  Insurance, increased IT budgets, executive management awareness of these new movements?  These are interesting groups that deserve our attention.&lt;br /&gt;
&lt;br /&gt;
About the Speaker - Ryan Behan is the Director of Internal IT at Netsmart Technologies Inc.  He is a strong proponent of information sharing, application security and improving business agility through automation and scalable infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ---- --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- '''Call For Topics &amp;amp; Speakers''' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
If you are interested in presenting or have a topic you'd like discussed at the July meeting, Please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].  Topics and Requests to be a speaker should be submitted by June 28th. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Pizza and refreshments will be provided&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
RSVP Requested  [http://www.regonline.com/OWASPLI http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Directions to Hofstra University (It is just off of Hempstead Turnpike): To get to the Student Center from the Meadowbrook Parkway: Go West on Hempstead Turnpike to the 4th traffic light and make a right on to Oak street, then make another right 100 feet into Hofstra’s parking lot. &amp;lt;!-- From Meadowbrook Parkway - Going West on Hempstead Turnpike (Route 24), go to the 3rd traffic light and make a right through the main entrance to Hofstra. It is the first building on the right. The parking lot is on the side of the building.  --&amp;gt; [http://maps.google.com/maps?hl=en&amp;amp;biw=1219&amp;amp;bih=809&amp;amp;um=1&amp;amp;ie=UTF-8&amp;amp;cid=0,0,18137204279734354163&amp;amp;fb=1&amp;amp;hq=hofstra+university&amp;amp;hnear=Old+Westbury,+NY&amp;amp;gl=us&amp;amp;daddr=Hofstra+University,+Hempstead,+NY+11549-1000&amp;amp;geocode=1582588550823583642,40.714111,-73.600523&amp;amp;ei=1ZixTb2EOeTs0gH3m7SLCQ&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=directions-to&amp;amp;resnum=2&amp;amp;ved=0CB8QngIwAQ Map]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt; &amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [https://www.owasp.org/index.php/Long_Island#tab=Chapter_Board_Members.2FContacts LI board member].&amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Calendar  ====&lt;br /&gt;
&lt;br /&gt;
'''2011 Meeting Schedule''' &amp;lt;br&amp;gt; ''The information on this page is subject to change'' &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Thursday, July 28 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 6:30pm-9:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: Student Center, Hofstra University, Hempstead, NY &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: Round Table Discussions &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, September 18 &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Sunday, November 13 &lt;br /&gt;
&lt;br /&gt;
*Time: 12:30pm-3:30pm &amp;lt;br&amp;gt; &lt;br /&gt;
*Location: TBD &amp;lt;br&amp;gt; &lt;br /&gt;
*Topics: TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Past Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''May Meeting'''&lt;br /&gt;
*Date: Saturday, May 14, 2011 &lt;br /&gt;
*Time: 12:30pm - 3:30pm &lt;br /&gt;
*Location: University Club Facility at David Mack Hall, Hosftra University, Hempstead, NY 11549-1000 &lt;br /&gt;
*Topics &amp;amp; Speakers: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;Robert Gezelter - &amp;lt;br&amp;gt;&lt;br /&gt;
'''Minimum Necessary Implementation: Reducing Attack Surface increase Security''' &amp;lt;br&amp;gt;&lt;br /&gt;
Ensuring the security and integrity of web-based applications is a constant challenge. Web-based applications are inherently customer-facing, and an attractive avenue of attack. However, vulnerability is often unnecessarily increased by poor technology choices. Different technologies have different degrees of vulnerability. ActiveX creates a higher exposure than Java or JavaScript, which in turn has more potential for abuse than simple CSS.  Some approaches (e.g., unguarded SQL queries) are particularly vulnerable to attack (e.g., SQL injection); other approaches unnecessarily create exposures by requiring unrestricted trust (e.g., ActiveX). &amp;lt;br&amp;gt;&lt;br /&gt;
Judicious division of responsibilities between clients and servers is another aspect of the same problem, as clients are inherently less-trustable than servers.&lt;br /&gt;
We will examine how using the minimum necessary technology reduces attack surface, decreases vulnerabilities, and decreases costs. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
About the speaker - Mr. Gezelter has more than 30 years of international consulting experience on architectures, protocols, and implementation techniques in both the private and public sectors.  He has spoken widely at conferences throughout the United States and internationally.  He has also  published numerous technical papers and book chapters, including two chapters in the Computer Security Handbook, 5th Edition and two chapters in the Handbook of Information Security. He also publishes Ruminations - An IT Blog on a variety of topics relating to Information Technology and systems architect &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''March Meeting''' &amp;lt;br&amp;gt; '''Date:''' 3/27/2011 Sunday&amp;lt;br&amp;gt; '''Time:''' 12pm-3pm&amp;lt;br&amp;gt; '''Place:''' 2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Intro to the OWASP Mobile Project''' &lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member &lt;br /&gt;
&lt;br /&gt;
'''The Exploit Intelligence Project''' &lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and Clampi successfully infect devices despite organizations carefully managing disclosed vulnerabilities and subscribing to detailed analysis of the latest malware families. Existing efforts at malware prevention focus broadly on vulnerabilities and their impact yet ignore the means by which they are exploited and the motivations, opportunities and capabilities of attackers, which has allowed this problem to become worse year-after-year. &lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware defense, focusing on attacker's capabilities and methods, with data collected from the most popular crimeware packs currently deployed in-the-wild. This analysis identifies the means by which exploits are developed and selected for inclusion in crimeware packs, identifies defenses that are outside the capability of malware exploit writers to bypass, and helps attendees evaluate not just the exploitability, but the probability of a vulnerability being exploited. This study shows that, until crimeware packs substantially advance in sophistication, only a few simple defensive tactics are required to protect users from such opportunistic threats. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; [http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &amp;lt;br&amp;gt; [http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro''' WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab. &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
''Free pizza and beverage will be provided. After event networking will be held at a local bar.''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP] &lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan] &lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704 &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
&lt;br /&gt;
*[http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube] &lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos] &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations Industry Citations] &lt;br /&gt;
*[http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;br /&gt;
&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=107309</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=107309"/>
				<updated>2011-03-22T03:11:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [https://spreadsheets.google.com/embeddedform?formkey=dF9NOW5BQTBLbVNPdGdrNzFhWWJMMnc6MQ http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  2nd Floor, Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=107308</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=107308"/>
				<updated>2011-03-22T03:09:28Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [https://spreadsheets.google.com/embeddedform?formkey=dF9NOW5BQTBLbVNPdGdrNzFhWWJMMnc6MQ http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106972</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106972"/>
				<updated>2011-03-16T13:56:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Jericho Public Library, 1 Merry Lane, Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106971</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106971"/>
				<updated>2011-03-16T13:56:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Jericho Public Library, 1 Merry Lane Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106970</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106970"/>
				<updated>2011-03-16T13:55:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Jericho Public Library 1 Merry Lane Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106969</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106969"/>
				<updated>2011-03-16T13:55:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Jericho Public Library 1 Merry Lane Jericho, New York 11753 &amp;lt;br&amp;gt; [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Jericho+Public+Library+1+Merry+Lane+Jericho,+New+York+11753&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=45.553578,95.800781&amp;amp;ie=UTF8&amp;amp;hq=Jericho+Public+Library&amp;amp;hnear=1+Merry+Ln,+Jericho,+Nassau,+New+York+11753&amp;amp;ll=40.79414,-73.535979&amp;amp;spn=0.010299,0.023389&amp;amp;z=16 Google Map Link]&lt;br /&gt;
&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project WebScarab] Demo / Web Vulnerabilities Intro&amp;lt;/b&amp;gt;&lt;br /&gt;
WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review and modify requests created by the browser before they are sent to the server, and to review and modify responses returned from the server before they are received by the browser. WebScarab is able to intercept both HTTP and HTTPS communication. The operator can also review the conversations (requests and responses) that have passed through WebScarab.  &lt;br /&gt;
&lt;br /&gt;
In this demo we'll use WebScarab against some emulated vulnerabilities developed by Blake Cornell.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106476</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106476"/>
				<updated>2011-03-08T19:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Rajendra Umadas, OWASP Member&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tool Demo TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106475</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106475"/>
				<updated>2011-03-08T19:38:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Rajendra Umadas, OWASP Member&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tool Demo TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106474</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=106474"/>
				<updated>2011-03-08T19:38:09Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Long Island&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Educational Supporter: {{MemberLinks|link=http://www.adelphi.edu|logo=AdelphiLogo-150x64.png}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/27/2011 Sunday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  12pm-3pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  TBD &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Rajendra Umadas&amp;lt;/b&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Intro to the OWASP Mobile Project&amp;lt;/b&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
The OWASP Mobile Project is in its infancy, but has generated a lot of interest in the security and mobile development communities. Recently, delegates at the OWASP Summit in Portugal started laying the ground work to help guide the project through its inaugural year. One of the objectives for this year will be to ratify the current, unofficial OWASP Mobile Top 10 List. This presentation will do a deep dive into the current list, citing real world examples of insecure mobile applications.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;The Exploit Intelligence Project&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2011, mass malware is still the most common source of compromise on&lt;br /&gt;
corporate networks. Bots like Zeus, Gozi, and Clampi successfully&lt;br /&gt;
infect devices despite organizations carefully managing disclosed&lt;br /&gt;
vulnerabilities and subscribing to detailed analysis of the latest&lt;br /&gt;
malware families. Existing efforts at malware prevention focus broadly&lt;br /&gt;
on vulnerabilities and their impact yet ignore the means by which they&lt;br /&gt;
are exploited and the motivations, opportunities and capabilities of&lt;br /&gt;
attackers, which has allowed this problem to become worse&lt;br /&gt;
year-after-year.&lt;br /&gt;
&lt;br /&gt;
In this talk, I introduce an intelligence-driven approach to malware&lt;br /&gt;
defense, focusing on attacker's capabilities and methods, with data&lt;br /&gt;
collected from the most popular crimeware packs currently deployed&lt;br /&gt;
in-the-wild. This analysis identifies the means by which exploits are&lt;br /&gt;
developed and selected for inclusion in crimeware packs, identifies&lt;br /&gt;
defenses that are outside the capability of malware exploit writers to&lt;br /&gt;
bypass, and helps attendees evaluate not just the exploitability, but&lt;br /&gt;
the probability of a vulnerability being exploited. This study shows&lt;br /&gt;
that, until crimeware packs substantially advance in sophistication,&lt;br /&gt;
only a few simple defensive tactics are required to protect users from&lt;br /&gt;
such opportunistic threats.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Tool Demo TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a [http://www.owasp.org/index.php?title=Long_Island&amp;amp;action=submit#tab=Chapter_Leaders.2FContacts LI board member].&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Board Members/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.youtube.com/user/AppsecTutorialSeries AppSec Tutorial on YouTube]&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Training#tab=Videos_.26_Pictures OWASP video and photos]&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations Industry Citations]&lt;br /&gt;
* [http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 for 2010 was released on April 19, 2010]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=79525</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=79525"/>
				<updated>2010-03-10T16:26:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Added Dan Guido's presentation subject. -RCB&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [http://fs18.formsite.com/owaspli/form995438520/index.html http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  3/18/10 Thursday&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  6:30 - 8pm&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Adelphi Garden City Campus  Ruth S. Harley University Center, room 210  [http://www.adelphi.edu/visitors/campus.php Campus Map]&amp;lt;i&amp;gt;The University Center is in the center of the campus, all the way to the North (marked as UNC)&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Via the Long Island Expressway (Route 495) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Traveling east&amp;lt;br&amp;gt;&lt;br /&gt;
Take the L.I.E. to Exit 34 South or the Northern State Parkway to Exit 26 South (New Hyde Park Road). Turn right onto New Hyde Park Road. Continue south on New Hyde Park Road for approximately 3 miles. Turn left onto Stewart Avenue. At the fourth light, turn right onto Nassau Boulevard. Continue approximately for a quarter of a mile. At the first light (as soon as you cross over the railroad tracks), make a left onto South Avenue. The entrance to campus will be on your right.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Traveling west&amp;lt;br&amp;gt;&lt;br /&gt;
Take the L.I.E. to Exit 39 South or the Northern State Parkway to Exit 31 (Glen Cove Road). Go south. (Note: the road will change from Guinea Woods Road to Glen Cove Road to Clinton Road). Turn right onto Stewart Avenue. Go one mile and at T-junction turn left onto Hilton Avenue. Immediately after crossing the railroad tracks, turn right onto Sixth Street. Continue onto South Avenue. The entrance to campus will be on your left..&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Speakers: (TBD)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.linkedin.com/in/blakecornell Blake Cornell], OWASP Board Member NY/NJ/LI&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Session Initiation Protocol Bounce Attacks: Enumeration of Networked Addressing and Services With Timing Attacks and Other Vectors&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The SIP Bounce Attack is similar in nature to the File Transfer Protocol (FTP) Bounce Attack.  SIP allows an attacker the ability to communicate with any Internet Protocol (IP) address or Fully Qualified Domain Name (FQDN) and their respective UDP or TCP port numbers.  Utilizing precise timing algorithms it is possible to enumerate the address allocation of private networks (2) and determine the state of their ports.   This is possible without authentication.&lt;br /&gt;
&lt;br /&gt;
There is an increasing trend to host SIP services publicly on the internet behind Demilitarized Zones (DMZ), firewalls and Access Control Lists (ACLs).  Having the ability to bounce traffic through a protected system and allowing analysis of response data is quite risky.&lt;br /&gt;
&lt;br /&gt;
If a consumer grade VoIP product were reliably vulnerable to SIP bouncing an attacker could have a plethora of possible zombie proxies to choose from.&lt;br /&gt;
&lt;br /&gt;
These and other risks will be discussed.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Threat Modeling APT: A discussion of tactics behind recent targeted intrusions.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;i&amp;gt;Free pizza and beverage will be provided.  After event networking will be held at a local bar.&amp;lt;/i&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for an evening of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local venue TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a LI board member.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71112</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71112"/>
				<updated>2009-10-08T13:48:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [http://fs18.formsite.com/owaspli/form933354881/index.html http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  10/24/2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  11:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;11-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;11-20 - Attacking VoIP With The OWASP Top 10&lt;br /&gt;
:VoIP systems allow for cheap and easy telephony communication.  Current VoIP implementations may be more vulnerable then you believe.  How could an attacker own your PBX with the OWASP Top 10?  Topics will include Vulnerability Research, Protocol Fuzzing, VoIP and the OWASP Top 10.  Proof of concept zero day vectors will be discovered and exploited.  This is going to be fun!&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-20 - Network Version Control&lt;br /&gt;
:Leveraging Python, Nmap, Ndiff and Subversion to create baselines of your hosts and services.  Together, these form a basic foundation to detect unapproved changes and alert accordingly.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
;13-20 - Passive Web Application Analysis &lt;br /&gt;
:Discover ways to leverage the tools you currently use to find potential vulnerabilities in web applications as early as during an initial application walk through. This talk will cover the current state of passive web application analysis as well as discuss how to set up a framework for your own testing needs.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/phillipames Phil Ames], Security Consultant&lt;br /&gt;
&lt;br /&gt;
;All Day Event - Capture the Flag&lt;br /&gt;
:There will be a day long CTF event.  Test your skills, learn new exploitation techniques, hack in a team, get the highest score, win prizes?  Hack the day away with your friends and peers.&lt;br /&gt;
:--'''[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
;AFTER EVENT NETWORKING WILL BE HELD AT '''[http://www.bluepointbrewing.com/ THE BLUE POINT BREWERY]!!&lt;br /&gt;
;&amp;gt;&amp;gt;&amp;gt; We have arranged for a private tour for all OWASP attendees. &amp;lt;&amp;lt;&amp;lt;&lt;br /&gt;
Rides will be provided to the Blue Point Brewery.  When you are done with enjoying the best brews on the East Coast, the train station is only '''[http://maps.google.com/maps?saddr=161+River+Ave,+Patchogue,+NY+11772-3304+(Blue+Point+Brewing+Co)&amp;amp;geocode=CcnpYL67h5V6FVfvbQIdy8el-yEHMT9JQF0-7g&amp;amp;dirflg=&amp;amp;daddr=patchogue+train+station,+patchogue,+ny+11772&amp;amp;f=d&amp;amp;dq=blue+point+brewery,+loc:+patchogue,+ny+11772&amp;amp;sll=40.759127,-73.021493&amp;amp;sspn=0.014359,0.014046&amp;amp;ie=UTF8&amp;amp;ll=40.761691,-73.020887&amp;amp;spn=0.02919,0.055876&amp;amp;z=15 a short walk]''' away!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local venue TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a LI board member.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71095</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71095"/>
				<updated>2009-10-08T12:23:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [http://fs18.formsite.com/owaspli/form933354881/index.html http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  10/24/2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  11:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;11-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;11-20 - Attacking VoIP With The OWASP Top 10&lt;br /&gt;
:VoIP systems allow for cheap and easy telephony communication.  Current VoIP implimentations may be more vulnerable then you believe.  How could an attacker 0wn your PBX with the OWASP Top 10?  Topics will include Vulnerability Research, Protocol Fuzzing, VoIP and the OWASP Top 10.  Proof of concept 0day vectors will be discovered and exploited.  This is going to be fun!&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-20 - Network Version Control&lt;br /&gt;
:Leveraging Python, Nmap, Ndiff and Subversion to create baselines of your hosts and services.  Together, these form a basic foundation to detect unapproved changes and alert accordingly.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
;13-20 - Passive Web Application Analysis &lt;br /&gt;
:Discover ways to leverage the tools you currently use to find potential vulnerabilities in web applications as early as during an initial application walk through. This talk will cover the current state of passive web application analysis as well as discuss how to set up a framework for your own testing needs.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/phillipames Phil Ames], Security Consultant&lt;br /&gt;
&lt;br /&gt;
;All Day Event - Capture the Flag&lt;br /&gt;
:There will be a day long CTF event.  Test your skills, learn new exploitation techniques, hack in a team, get the highest score, win prizes?  Hack the day away with your friends and peers.&lt;br /&gt;
:--'''[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
;AFTER EVENT NETWORKING WILL BE HELD AT '''[http://www.bluepointbrewing.com/ THE BLUE POINT BREWERY]!!&lt;br /&gt;
Rides will be provided to the Blue Point Brewery.  When you are done with enjoying the best brews on the East Coast, the train station is only '''[http://maps.google.com/maps?saddr=161+River+Ave,+Patchogue,+NY+11772-3304+(Blue+Point+Brewing+Co)&amp;amp;geocode=CcnpYL67h5V6FVfvbQIdy8el-yEHMT9JQF0-7g&amp;amp;dirflg=&amp;amp;daddr=patchogue+train+station,+patchogue,+ny+11772&amp;amp;f=d&amp;amp;dq=blue+point+brewery,+loc:+patchogue,+ny+11772&amp;amp;sll=40.759127,-73.021493&amp;amp;sspn=0.014359,0.014046&amp;amp;ie=UTF8&amp;amp;ll=40.761691,-73.020887&amp;amp;spn=0.02919,0.055876&amp;amp;z=15 a short walk]''' away!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local venue TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a LI board member.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71094</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=71094"/>
				<updated>2009-10-08T12:22:31Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Final updates for the 10/24/2009 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
RSVP REQUESTED [http://fs18.formsite.com/owaspli/form933354881/index.html http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  10/24/2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  11:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;11-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;11-20 - Attacking VoIP With The OWASP Top 10&lt;br /&gt;
:VoIP systems allow for cheap and easy telephony communication.  Current VoIP implimentations may be more vulnerable then you believe.  How could an attacker 0wn your PBX with the OWASP Top 10?  Topics will include Vulnerability Research, Protocol Fuzzing, VoIP and the OWASP Top 10.  Proof of concept 0day vectors will be discovered and exploited.  This is going to be fun!&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-20 - Network Version Control&lt;br /&gt;
:Leveraging Python, Nmap, Ndiff and Subversion to create baselines of your hosts and services.  Together, these form a basic foundation to detect unapproved changes and alert accordingly.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
;13-20 - Passive Web Application Analysis &lt;br /&gt;
:Discover ways to leverage the tools you currently use to find potential vulnerabilities in web applications as early as during an initial application walk through. This talk will cover the current state of passive web application analysis as well as discuss how to set up a framework for your own testing needs.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/phillipames Phil Ames], Security Consultant&lt;br /&gt;
&lt;br /&gt;
;All Day Event - Capture the Flag&lt;br /&gt;
:There will be a day long CTF event.  Test your skills, learn new exploitation techniques, hack in a team, get the highest score, win prizes?  Hack the day away with your friends and peers.&lt;br /&gt;
:--'''[http://pentest.cryptocity.net/blog/ Dan Guido], OWASP NY/NJ Board Member&lt;br /&gt;
&lt;br /&gt;
;AFTER EVENT NETWORKING WILL BE HELD AT '''[http://www.bluepointbrewing.com/ THE BLUE POINT BREWERY]!!&lt;br /&gt;
Rides will be provided to the Blue Point Brewery.  When you are done with enjoying the best brews on the East Coast, the train station is only '''[http://maps.google.com/maps?saddr=161+River+Ave,+Patchogue,+NY+11772-3304+(Blue+Point+Brewing+Co)&amp;amp;geocode=CcnpYL67h5V6FVfvbQIdy8el-yEHMT9JQF0-7g&amp;amp;dirflg=&amp;amp;daddr=patchogue+train+station,+patchogue,+ny+11772&amp;amp;f=d&amp;amp;dq=blue+point+brewery,+loc:+patchogue,+ny+11772&amp;amp;sll=40.759127,-73.021493&amp;amp;sspn=0.014359,0.014046&amp;amp;ie=UTF8&amp;amp;ll=40.761691,-73.020887&amp;amp;spn=0.02919,0.055876&amp;amp;z=15 a short walk]''' from the Brewery.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local venue TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you can host an upcoming meeting please contact a LI board member.&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=68391</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=68391"/>
				<updated>2009-09-01T16:19:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  10/24/2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  11:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;RSVP REQUIRED [http://fs18.formsite.com/owaspli/form562038653/index.html http://www.owasp.org/images/7/7f/Register.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;11-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;11-20 - Attacking VoIP With The OWASP Top 10&lt;br /&gt;
:VoIP systems allow for cheap and easy telephony communication.  How can an attacker 0wn your PBX with the OWASP Top 10?  Proof of concept 0day attacks will be demonstrated and detailed.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-20 - Network Version Control&lt;br /&gt;
:Leveraging Python, Nmap, Ndiff and Subversion to create baselines of your hosts and services.  Together, these form a basic foundation to detect unapproved changes and alert accordingly.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
;13-20 - TBD&lt;br /&gt;
:--TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AFTER EVENT NETWORKING ON THE WATER!!&lt;br /&gt;
&lt;br /&gt;
'''[http://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=3500+Sunrise+Hwy,+Great+River,+NY+11739&amp;amp;daddr=445+Vanderbilt+Blvd,+Oakdale,+NY+11769-2009&amp;amp;hl=en&amp;amp;geocode=%3BFTN1bQIdVfuj-w&amp;amp;gl=us&amp;amp;mra=ls&amp;amp;sll=40.727859,-73.139371&amp;amp;sspn=0.011155,0.027938&amp;amp;ie=UTF8&amp;amp;ll=40.737925,-73.149204&amp;amp;spn=0.022307,0.055876&amp;amp;t=h&amp;amp;z=15 THE WHARF]&lt;br /&gt;
&lt;br /&gt;
445 Vanderbilt Blvd, Oakdale, NY 11769&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local restaurant TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=68390</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=68390"/>
				<updated>2009-09-01T16:18:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Added the event's data and Ryan Behan's Topic&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  10/24/2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  11:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;RSVP REQUIRED [http://fs18.formsite.com/owaspli/form562038653/index.html http://www.owasp.org/images/7/7f/Register.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;11-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;11-20 - Attacking VoIP With The OWASP Top 10&lt;br /&gt;
:VoIP systems allow for cheap and easy telephony communication.  How can an attacker 0wn your PBX with the OWASP Top 10?  Proof of concept 0day attacks will be demonstrated and detailed.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-20 - Network Version Control&lt;br /&gt;
:--Leveraging Python, Nmap, Ndiff and Subversion to create baselines of your hosts and services.  Together, these form a basic foundation to detect unapproved changes and alert accordingly.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], OWASP LI Board Member&lt;br /&gt;
;13-20 - TBD&lt;br /&gt;
:--TBD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AFTER EVENT NETWORKING ON THE WATER!!&lt;br /&gt;
&lt;br /&gt;
'''[http://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=3500+Sunrise+Hwy,+Great+River,+NY+11739&amp;amp;daddr=445+Vanderbilt+Blvd,+Oakdale,+NY+11769-2009&amp;amp;hl=en&amp;amp;geocode=%3BFTN1bQIdVfuj-w&amp;amp;gl=us&amp;amp;mra=ls&amp;amp;sll=40.727859,-73.139371&amp;amp;sspn=0.011155,0.027938&amp;amp;ie=UTF8&amp;amp;ll=40.737925,-73.149204&amp;amp;spn=0.022307,0.055876&amp;amp;t=h&amp;amp;z=15 THE WHARF]&lt;br /&gt;
&lt;br /&gt;
445 Vanderbilt Blvd, Oakdale, NY 11769&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local restaurant TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64935</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64935"/>
				<updated>2009-06-26T02:10:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Updated the directions for attendees once they are onsite. -RCB- 6/25/2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  Saturday June 27th 2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  10:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Turn right after passing the security gate.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all attendees do not park in any spot marked as RESERVED.  Once you enter building 200, pass through security, turn right and head down the hall, pass through the first set of doors.  Our conference room is your first right.  There will be signs posted along this path directing attendees to the room.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;RSVP REQUIRED [http://fs18.formsite.com/owaspli/form562038653/index.html http://www.owasp.org/images/7/7f/Register.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;10-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;10-20 - Incident Response - Identify, Contain, Eradicate, Recover, Lessons Learned&lt;br /&gt;
:Breaches happen.  Proper audit compliance enables an organization the ability to detect and prevent attacks.  A case study will be examined.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan] Manager of Network Technologies at [http://www.ntst.com/ Netsmart Technologies]&lt;br /&gt;
;11-20 - Code Blue - The Unhealthy State of Your Medical Records (And What Can Be Done to Save Them)&lt;br /&gt;
:Millions of patient records have been disclosed to unauthorized third parties.  Some of these records were stolen, some were lost yet all could have been prevented.&lt;br /&gt;
&lt;br /&gt;
:A North Carolina hospital loses a laptop with 14,000 records.  The Peninsula Orthopedic Associates lost backup tapes that help 100,000 patient records.  The Wallgreens Health Initiative emailed 28,000 records to the state of Kentucky without using encryption.  Confiker infects three University of Utah hospitals.  Kaiser fires 15 employees for inappropriately accessing medical records.  Two Scottish hospitals were infected by a computer worm.  Researchers find 20,000 medical records using peer-to-peer software.  The Mytob worm infects 4,700 computers at three UK hospitals.  Confiker infects 8,000 computers at the Sheffield Teaching Hospitals Trust.  Criminals tried to extort Express Scripts with the threat of releasing millions of patient records.  SRA International was breached when malicious software allowed an attacker the ability to access patient data maintained by SRA.  The list goes on.&lt;br /&gt;
&lt;br /&gt;
:All of these incidents were reported in the news within a five month period of each other.  News like this is being reported with an increasing frequency.  &lt;br /&gt;
&lt;br /&gt;
:Most of these incidents could have been easily avoided by conducting compliance audits and vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
;12-25 - Education, &amp;quot;So you want to train an army of ninjas...&amp;quot; - Teaching offensive techniques to college students&lt;br /&gt;
:Dan will discuss the challenges, successes, surprises, and lessons learned creating and delivering a penetration testing course for undergraduate and graduate students at NYU:Poly. The course, which ran on-campus during the Fall 2008 semester, was taught to 30 students and with the help of 5 instructors from outside the university: After 6 weeks, students were given a takehome midterm that tested their ability to apply theoretical techniques discussed in class and that tracked the evolution of their &amp;quot;hacker's mindset.&amp;quot; This talk presents lessons learned as &amp;quot;design patterns&amp;quot; that conference attendees can apply to their own courses to increase their effectiveness and train their own army of ninjas in a university setting. Additionally, all course material, videotaped lectures, and student work from the Fall 2008 NYU:Poly Penetration Testing and Vulnerability Analysis course have been made freely available online at: [http://pentest.cryptocity.net/]&lt;br /&gt;
&lt;br /&gt;
:--'''[http://cryptocity.net Dan Guido], Board Member OWASP NYNJ&lt;br /&gt;
;13-25 - Round Table Discussion - Successes, challenges, efforts, hopes and predictions for OWASP Long Island&lt;br /&gt;
:--'''[http://www.linkedin.com/in/helengao Helen Gao], Board Member, OWASP LI&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], Board Member, OWASP LI&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell], Board Member, OWASP NYNJ/LI&lt;br /&gt;
:--'''[[User:Dguido|Dan Guido]], Board Member OWASP NYNJ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AFTER EVENT NETWORKING ON THE WATER !!&lt;br /&gt;
&lt;br /&gt;
'''[http://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=3500+Sunrise+Hwy,+Great+River,+NY+11739&amp;amp;daddr=445+Vanderbilt+Blvd,+Oakdale,+NY+11769-2009&amp;amp;hl=en&amp;amp;geocode=%3BFTN1bQIdVfuj-w&amp;amp;gl=us&amp;amp;mra=ls&amp;amp;sll=40.727859,-73.139371&amp;amp;sspn=0.011155,0.027938&amp;amp;ie=UTF8&amp;amp;ll=40.737925,-73.149204&amp;amp;spn=0.022307,0.055876&amp;amp;t=h&amp;amp;z=15 THE WHARF]&lt;br /&gt;
&lt;br /&gt;
445 Vanderbilt Blvd, Oakdale, NY 11769&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local restaurant TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64647</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64647"/>
				<updated>2009-06-21T12:22:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Added directions to The Wharf.  -RCB - 6-21-2009 Happy Solstice&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  Saturday June 27th 2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  10:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all Attendees do not park in any spot marked as RESERVED.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;RSVP REQUIRED [http://fs18.formsite.com/owaspli/form562038653/index.html http://www.owasp.org/images/7/7f/Register.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;10-00 - Opening Remarks &amp;amp; Welcome to [http://www.owasp.org/images/9/9f/2009-OWASP_KeyNote-V2.pdf OWASP Foundation]&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board  &lt;br /&gt;
;10-20 - Incident Response - Identify, Contain, Eradicate, Recover, Lessons Learned&lt;br /&gt;
:Breaches happen.  Proper audit compliance enables an organization the ability to detect and prevent attacks.  A case study will be examined.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan] Manager of Network Technologies at [http://www.ntst.com/ Netsmart Technologies]&lt;br /&gt;
;11-20 - Code Blue - The Unhealthy State of Your Medical Records (And What Can Be Done to Save Them)&lt;br /&gt;
:Millions of patient records have been disclosed to unauthorized third parties.  Some of these records were stolen, some were lost yet all could have been prevented.&lt;br /&gt;
&lt;br /&gt;
:A North Carolina hospital loses a laptop with 14,000 records.  The Peninsula Orthopedic Associates lost backup tapes that help 100,000 patient records.  The Wallgreens Health Initiative emailed 28,000 records to the state of Kentucky without using encryption.  Confiker infects three University of Utah hospitals.  Kaiser fires 15 employees for inappropriately accessing medical records.  Two Scottish hospitals were infected by a computer worm.  Researchers find 20,000 medical records using peer-to-peer software.  The Mytob worm infects 4,700 computers at three UK hospitals.  Confiker infects 8,000 computers at the Sheffield Teaching Hospitals Trust.  Criminals tried to extort Express Scripts with the threat of releasing millions of patient records.  SRA International was breached when malicious software allowed an attacker the ability to access patient data maintained by SRA.  The list goes on.&lt;br /&gt;
&lt;br /&gt;
:All of these incidents were reported in the news within a five month period of each other.  News like this is being reported with an increasing frequency.  &lt;br /&gt;
&lt;br /&gt;
:Most of these incidents could have been easily avoided by conducting compliance audits and vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
&lt;br /&gt;
;12-10 - Lunch TBD&lt;br /&gt;
:TBD&lt;br /&gt;
;12-25 - Education, Penetration Testing and Vulnerability Analysis&lt;br /&gt;
:A course in Penetration Testing has existed at NYU:Poly as far back as 2002, in large part because of a NSA Center of Excellence in Education certification requirement. Professors for the course have come and gone and the course content has changed with them, sometimes for the better, but mostly for the worse. In the Summer of 2008, with no instructor in sight for the coming semester and the course material seriously neglected, I offered to teach it and rewrite it from scratch.&lt;br /&gt;
&lt;br /&gt;
:These are my experiences.&lt;br /&gt;
:--'''[http://pentest.cryptocity.net/history/ Dan Guido], Board Member OWASP NYNJ&lt;br /&gt;
;13-25 - Round Table Discussion - Successes, challenges, efforts, hopes and predictions for OWASP Long Island&lt;br /&gt;
:--'''[http://www.linkedin.com/in/helengao Helen Gao], Board Member, OWASP LIhttp://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=3500+Sunrise+Hwy,+Great+River,+NY+11739&amp;amp;daddr=445+Vanderbilt+Blvd,+Oakdale,+NY+11769-2009&amp;amp;hl=en&amp;amp;geocode=%3BFTN1bQIdVfuj-w&amp;amp;gl=us&amp;amp;mra=ls&amp;amp;sll=40.727859,-73.139371&amp;amp;sspn=0.011155,0.027938&amp;amp;ie=UTF8&amp;amp;ll=40.737925,-73.149204&amp;amp;spn=0.022307,0.055876&amp;amp;t=h&amp;amp;z=15&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], Board Member, OWASP LI&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell], Board Member, OWASP NYNJ/LI&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AFTER EVENT NETWORKING ON THE WATER !!&lt;br /&gt;
&lt;br /&gt;
'''[http://maps.google.com/maps?f=d&amp;amp;source=s_d&amp;amp;saddr=3500+Sunrise+Hwy,+Great+River,+NY+11739&amp;amp;daddr=445+Vanderbilt+Blvd,+Oakdale,+NY+11769-2009&amp;amp;hl=en&amp;amp;geocode=%3BFTN1bQIdVfuj-w&amp;amp;gl=us&amp;amp;mra=ls&amp;amp;sll=40.727859,-73.139371&amp;amp;sspn=0.011155,0.027938&amp;amp;ie=UTF8&amp;amp;ll=40.737925,-73.149204&amp;amp;spn=0.022307,0.055876&amp;amp;t=h&amp;amp;z=15 THE WHARF]&lt;br /&gt;
&lt;br /&gt;
445 Vanderbilt Blvd, Oakdale, NY 11769&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local restaurant TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64103</id>
		<title>Long Island</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Long_Island&amp;diff=64103"/>
				<updated>2009-06-12T01:46:26Z</updated>
		
		<summary type="html">&lt;p&gt;Ryan Behan: Mispelled &amp;quot;Reound&amp;quot;, this has been corrected. - RCB&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Long Island | extra= | mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-longisland | emailarchives=http://lists.owasp.org/pipermail/owasp-longisland }}&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&amp;lt;p style=&amp;quot;margin:0; background:#cef2e0; font-size:120%; font-weight:bold; border:1px solid #a3bfb1; text-align:left; color:#000; padding:0.2em 0.4em; &amp;quot;&amp;gt;Scroll down to see the upcoming Long Island OWASP events&amp;lt;/p&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Date:&amp;lt;/b&amp;gt;  Saturday June 27th 2009&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Time:&amp;lt;/b&amp;gt;  10:00-14:00&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Place:&amp;lt;/b&amp;gt;  Sunrise Business Center, 3500 Sunrise Hwy, Great River, NY 11730, Building 200 [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=3500+Sunrise+Hwy,+NY,+Great+River,+NY,+Building+200&amp;amp;sll=40.748249,-73.163388&amp;amp;sspn=0.009298,0.022745&amp;amp;ie=UTF8&amp;amp;ll=40.748249,-73.163388&amp;amp;spn=0.009298,0.022745&amp;amp;t=h&amp;amp;z=16&amp;amp;iwloc=A MAP]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Directions:&amp;lt;/b&amp;gt;  Enter from the service road on the East Bound side of Sunrise Hwy.  Attendees can park in front of Building 200 and enter through the Building 200 entrance.  We must ask that all Attendees do not park in any spot marked as RESERVED.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;RSVP REQUIRED [http://fs18.formsite.com/owaspli/form562038653/index.html http://www.owasp.org/images/7/7f/Register.gif] &amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;u&amp;gt;Agenda:&amp;lt;/u&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
;10-00 - Opening Remarks &amp;amp; Welcome&lt;br /&gt;
:--'''Helen Gao, OWASP LI Board&lt;br /&gt;
;10-20 - Who is OWASP and how could we help you?&lt;br /&gt;
:--'''[http://www.linkedin.com/in/tombrennan Tom Brennan]&lt;br /&gt;
;11-20 - Incident Response - Identify, Contain, Eradicate, Recover, Lessons Learned&lt;br /&gt;
:Breaches happen.  Proper audit compliance enables an organization the ability to detect and prevent attacks.  A case study will be examined.&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan] Manager of Network Technologies at [http://www.ntst.com/ Netsmart Technologies]&lt;br /&gt;
;12-10 - Lunch TBD&lt;br /&gt;
:TBD&lt;br /&gt;
;12-25 - Code Blue - The Unhealthy State of Your Medical Records (And What Can Be Done to Save Them)&lt;br /&gt;
:Millions of patient records have been disclosed to unauthorized third parties.  Some of these records were stolen, some were lost yet all could have been prevented.&lt;br /&gt;
&lt;br /&gt;
:A North Carolina hospital loses a laptop with 14,000 records.  The Peninsula Orthopedic Associates lost backup tapes that help 100,000 patient records.  The Wallgreens Health Initiative emailed 28,000 records to the state of Kentucky without using encryption.  Confiker infects three University of Utah hospitals.  Kaiser fires 15 employees for inappropriately accessing medical records.  Two Scottish hospitals were infected by a computer worm.  Researchers find 20,000 medical records using peer-to-peer software.  The Mytob worm infects 4,700 computers at three UK hospitals.  Confiker infects 8,000 computers at the Sheffield Teaching Hospitals Trust.  Criminals tried to extort Express Scripts with the threat of releasing millions of patient records.  SRA International was breached when malicious software allowed an attacker the ability to access patient data maintained by SRA.  The list goes on.&lt;br /&gt;
&lt;br /&gt;
:All of these incidents were reported in the news within a five month period of each other.  News like this is being reported with an increasing frequency.  &lt;br /&gt;
&lt;br /&gt;
:Most of these incidents could have been easily avoided by conducting compliance audits and vulnerability assessments.&lt;br /&gt;
&lt;br /&gt;
We will walk through some recent incidents involving health care facilities around the world and detail how they could have been prevented.&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell] Security Consultant [http://www.net2s-us.com/ Net2S/BT-INS], OWASP NY/NJ/LI Board Member&lt;br /&gt;
;13-25 - Round Table Discussion - Successes, challenges, efforts, hopes and predictions for OWASP Long Island&lt;br /&gt;
:--'''[http://www.linkedin.com/in/tombrennan Tom Brennan], Global Board Member, OWASP Foundation&lt;br /&gt;
:--'''Helen Gao, Board Member, OWASP LI&lt;br /&gt;
:--'''[http://www.linkedin.com/pub/ryan-behan/9/746/a12 Ryan Behan], Board Member, OWASP LI&lt;br /&gt;
:--'''[http://www.linkedin.com/in/blakecornell Blake Cornell], Board Member, OWASP NYNJ/LI&lt;br /&gt;
&amp;lt;center&amp;gt;Come prepared for a day of networking with your industry peers.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;We invite all attendees to food and libations after the meeting at a local restaurant TBA.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;If you join our [http://lists.owasp.org/mailman/listinfo/owasp-longisland mailing list], then you will receive details of the meeting as soon as they are finalized.&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;To be a co-sponsor for this or a future meeting consider [http://www.owasp.org/index.php/Membership annual chapter sponsorship]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders/Contacts ====&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
*[mailto:heleng@owasp.org Helen Gao, CISSP]&lt;br /&gt;
*[mailto:ryan.behan@owasp.org Ryan C Behan]&lt;br /&gt;
*[mailto:blake@owasp.org Blake Cornell] 212-202-6704&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==External Links==&lt;br /&gt;
* [http://www.qualityit.net/Resources/WhitePapers/IEEEP1074-2005-RoadmapForOptimizingSecurityInTheSystemAndSoftwareLifeCycle.pdf IEEE considers security as a software lifecycle development requirement]&lt;br /&gt;
* [http://usa.visa.com/download/business/accepting_visa/ops_risk_management/cisp_PCI_Data_Security_Standard.pdf OWASP is a recommended secure coding guideline in PCI DSS]&lt;br /&gt;
* [http://www.ietf.org/rfc/rfc2828.txt Internet Security Glossary]&lt;/div&gt;</summary>
		<author><name>Ryan Behan</name></author>	</entry>

	</feed>